Why the Next-Generation of Application Security Is Needed

New software and code stand at the core of everything we do, but how well is all of this new code tested? Luckily, autonomous application security is here. By David…

Demo: A Guide to Virtual Machine App Security

Trend Micro – Trend Micro – It may seem like containers are the go-to method for cloud building, however 95% applications run on traditional infrastructure deployments like dedicated servers, shared…

Top 5 Healthcare Cyber Attacks and Threats

Even before the novel coronavirus pandemic, which forced healthcare organizations to shift to provide patients remote care and telemedicine rapidly, the healthcare industry had already embraced the cloud, as well…

High-Severity Vulnerabilities Now Take Nearly 250 Days to Remediate, Survey Finds

Security Intelligence – Security Intelligence – High-Severity Vulnerabilities Now Take Nearly 250 Days to Remediate, Survey Finds Businesses and agencies today are spending an average of about 250 days to…

Solution spotlight series: Authority to Operate on Amazon Web Services

Cloud-based services provide clear benefits to organisations through cost savings, greater flexibility, enhanced business agility, and greater operational resilience. Whilst the advantages are well understood, often the risks are overlooked.…

Integrate Serverless Security for Runtime Apps

Trend Micro – Trend Micro – The serverless paradigm offers solutions to application building and deployment without the challenges of infrastructure management. Organizations no longer need to perform capacity planning…

How SQL injection attacks work: Examples and video walkthrough

Injection attacks are the number one web application security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them in this walkthrough…

A threat to the West: Alastair MacGibbon on the vulnerability of WA’s industrial operational technology

With a large number of autonomous vehicles in operation, and utilities and supply chains increasingly reliant on operational technology, is Western Australia more vulnerable to a cyber attack? Alastair MacGibbon…

Introduction to Secure Software Development Life Cycle

The software development life cycle has seen many modifications and adjustments since it gained prominence in the 1970s. The developing needs of the end-users combined with the evolving nature of…

How to run a software composition analysis tool

Protecting your organization’s website from cyberthreats is important. Websites and data servers hold important information, after all. One way to project your website is by utilizing a web application security tool.…