days
-6
-1
hours
0
-1
minutes
-5
-8
seconds
-2
-3
search

#security

Making a disaster recovery plan

Data recovery: What matters when disaster hits

Did you know: Almost percent of small businesses never reopen following a natural disaster. All businesses, large and small, should have a data recovery plan in case disaster hits, whether that disaster is a flood or accidentally deleting critical code. Here’s what to anticipate when disaster strikes, and how to start preparing a solid recovery plan.

Fortifying mobile apps

App shielding vs. bug bounty programs: In pursuit of fortified mobile applications

Make no mistake, all software has bugs; the industry standard ranges from 15 to 50 errors per 1,000 of code. Code review and bug bounty programs cannot find all of them. For better security against vulnerabilities, companies should add a layer of protection with app shielding. App shielding is an approach to application security using a three-pronged approach.

Be brave, stay secure.

Is your browser tracking you? Brave and Mozilla Firefox offer privacy solutions

What browser do you use? Depending on your browser choice, websites may be tracking you wherever you go online. Popular websites can include up to 24 pieces of tracking content from companies such as Facebook and Google. In the fight for Internet security, both Brave and Mozilla Firefox offer free to use solutions. We go over some of the benefits of both browsers.

Keeping secrets under lock and key

HashiCorp Vault 1.3 adds new debugging command & more

HashiCorp Vault is focused on security, secret keeping, data encryption, and identity management. It keeps all your sensitive data, including API keys, passwords, and certificates, under wraps. Version 1.3 has now released to the public. Check out all the new updates made to HashiCorp vault, including some beta improvements, a new debug CLI command, and two new features just for Vault Enterprise.

Spinning order out of chaos

Is chaos engineering the key to lockdown cybersecurity?

The practice of chaos engineering can help unearth security problems that ordinarily, you would never discover. By utilizing chaos engineering best practices, your teams can keep up with how a potential hacker might infiltrate your network and gain a better understanding of the weaknesses in your infrastructure and what security measures to take.

Is your IoT fish tank secure?

Are there any real security threats to sensor-generated data?

IoT devices can be a weak leak and expose data to hackers. Businesses should be aware of the risks that can occur if attackers get their hands on data, and keep up with security updates and testing. How can hackers compromise sensor-generated data, and what are the best practices for IoT device security?

Keeping up with security

How AI assists in threat analytics and ensures better cybersecurity

As technology advances, users should keep up and evolve their security to stay one step ahead of hackers. AI software helps in threat analytics and ensures better cybersecurity and machine learning can help detect threats earlier. In this article, find out how AI can be used to help with security, and why it is perfect for the job.

Preventing man-in-the-middle attacks

TLS certificate pinning on mobile apps to secure from MiTM attacks

Mobile security has become more important than ever, especially as many employers adopt Bring Your Own Device for remote and in-house employees. What is TLS certificate pinning? Find out all about it and how to implement TLS pinning on Android and iOS apps and prevent man-in-the-middle (MiTM) attacks on mobile apps.

It's just a shift to the left, and a shift to the right

Securing containers throughout the entire build-ship-run lifecycle means shifting left and right

Security is no joke, especially as more and more companies are moving to cloud-based container setups. The stakes are high, and the price of a security breach can be catastrophic. CEO of NeuVector Fei Huang shares his thoughts about why DevSecOps matters and how to shift left and right to ensure security is considered all through the lifecycle, not just at deployment.

There is indeed some catching up to do!

Enterprise security must catch up with API innovation

When it comes to API security, even companies with world-class security teams like Facebook and Google are getting caught off guard. In this article, Bernard Harguindeguy offers 12 must-have best practices for protecting API infrastructure from hacking and abuses.