The Latest in IT Security

1

Software development has shifted from simply a technical process to an exercise of social morality. In the same way crash testing became a mandated part of automotive manufacturing once cars became ubiquitous, security must become a part of the software development life cycle from the beginning. As with vehicle safety, software security is often an […]

Read more ...

1

By taking the right precautionary steps, organizations can leverage open source software to rapidly develop applications – without compromising security. Open source software offers many benefits to development teams looking to rapidly develop applications in order to stay ahead in competitive markets. The advantages to leveraging open source libraries range from greater overall cost savings […]

Read more ...

1

In July 2018, F5 released its first annual Application Protection Report. As part of the report, F5 commissioned Ponemon to survey of 3,135 IT security practitioners across the world. The survey collected information about respondent’s application security processes. A key question asked for respondents to name their organization’s primary owner of application risk. In theory, […]

Read more ...

1

You know banks and related financial institutions are primary targets for cyberattacks and other security threats. In fact, notorious 20th-century bank robber Willie Sutton famously said he robbed banks “because that’s where the money is.” Times really haven’t changed much since then. Even as IT security is tightened, attackers are finding more innovative ways to […]

Read more ...

Categories

TUESDAY, SEPTEMBER 25, 2018

Featured

Archives

Latest Comments

Social Networks