Topic: application security

What is EMM? Enterprise Mobility Management explained

EMM hence refers to solutions, products and services that ensure the security of data and integrate with enterprise IT systems to meet corporate concerns.

5-steps-to-incorporate-threat-intelligence-into-your-security-awareness-program-300X225_2.jpg
Gartner forecasts worldwide information security spending to exceed $124 billion in 2019

Detection, response and privacy driving demand for security products and services.

What-is-DevSecOps-and-why-should-your-business-care.jpg
What is DevSecOps and why should your business care?

Although tacking on another three letters to the already heavily abbreviated 'devops' has the uncomfortable aura of word soup, 'devsecops' is a logical, essential continuation of the devops mindset.

Software-security.jpg
Software security: There’s more to it than bug-bounty programs

Take full advantage of white-hat hackers to help you secure your code. And still do all the other security stuff you should do before you release your code

security-controls.jpg
GitLab 11.1 devops tool improves security controls

Code searching and the user interface also see improvements

Creating customer value through cloud and security

Intertwined deep within the heart of local organisations, cloud and security conversations are combining to dominate boardroom agendas.

MS Office vulnerabilities, unexplained outage puts Microsoft in a tough spot

The biggest software company in the world, Microsoft has had a rough month with significant spikes in targeted malware attacks and an out-of-the-blue Office 365 outage that threw enterprises out of gear all over the globe. 

The great privacy debacle: Congress, BJP find themselves a common adversary

Here's how both BJP and Congress dropped the ball in the data privacy game

Twitter, Google lose their top security executives

Michael Coates, CISO, Twitter, and Michal Zalewski, director, Information security engineering and assurance, Google have quit their respective companies. 

Reaper emerges a cyber security threat for global enterprises

APT37, popularly known as Reaper has been primarily targeting the chemicals, electronics, manufacturing, aerospace, automotive, and healthcare industries for North Korean state interests.

Android for enterprise: Google specifies devices and guidelines

Google has laid down the minimum standards for smartphones to ensure their safe and effective use in the enterprise.

What is SQL injection? This oldie but goodie can make your web applications hurt

SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs.