Move faster with continuous security scanning in the cloud

These days cloud application developers are also security engineers. Who did not see this coming, given that application-level security is no longer an option? Also, we are pushing developers to...

How to secure REST with Spring Security

Securing web applications is an inherently complex proposition. offers Java developers a powerful framework for addressing this need, but that power comes with a steep learning curve.This article offers...

Security blind spots persist as companies cross-breed security with devops

has become common in software-development organizations around the world, but many companies are still struggling with cultural issues that are dampening security practitioners’ influence in the practices crucial...

How to use Auth0 with Node.js and Express

Cloud-based authentication and authorization platforms—sometimes known as IDaaS, or identity as a service — are an expanding area of cloud tooling, and it’s easy to see why. App security is...

Solving authorization for software developers

I’ve spoken to hundreds of development teams, and most of them still build authorization by hand, ad-hoc, and without a plan. That’s natural—no one has yet developed a “Stripe” or...

Security expert: Ransomware took in $1 billion in 2016

Increased user awareness of , better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against...

Why companies offer a hacking bounty — and why there are challenges

Want to make a cool $20,000?All you have to do is hack the Nintendo 3DS, a handheld console that’s been out for a few years already....

Exposed MongoDB installs being erased, held for ransom

Security researcher Victor Gevers, co-founder of , a non-profit dedicated to making the internet safer, is urging administrators to check their MongoDB installations, after finding nearly...

Data breaches through wearables put target squarely on IoT in 2017

Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed. Drop the mic—enough said.With the sheer velocity...

A lesson from network outages: Redundancy matters

Online outages are serious. Vendors lose money for every minute their users can't reach their web services, and business productivity tanks when employees can't access the web...

STAY CONNECTED

2,660,932FollowersFollow
14,013,586FollowersFollow
5,343SubscribersSubscribe