Enterprise organizations are scanning more applications for security vulnerabilities than ever before, but, troublingly, they are remediating fewer of their discoveries because of the sheer volume. As it has for the past 13 years, WhiteHat Security recently analyzed data from the results of application security tests the company performed at customer locations last year. The…

4 Ways At-Work Apps Are Vulnerable to Attack

They haven’t completely replaced phone calls or email, but communication and collaboration apps are becoming increasingly popular. For workers today, who are in and out of the office, working on the go, with multiple team members, it’s all about convenience and ease of use. Many rely on Slack, Google Hangouts, Box, SharePoint, and other applications…

Cloud-Delivered Network Security No Longer Optional

The adoption of the public cloud is driving a fundamental change in the way organizations connect remote users and distributed sites to their networks and applications. But as we’ve seen during other great times of change, tech transitions are tricky and always raise new security concerns. These are the security concerns of the Cloud Generation….

BrandPost: Countering the risks of cyberattacks posed by mobile apps

We’ve all become somewhat jaded when hearing about the billions of mobile devices being used by corporate employees and individual consumers (with individual devices increasingly used across both business and personal settings). Somewhat less well known – and still surprising – is the number of mobile apps active in the typical corporation. One recent assessment by Skyhigh Networks found that the average organization uses 1,427 cloud services, each represented…

IaaS Creating New Variant of Shadow IT

Organizations cannot rely on commercial off-the-shelf (COTS) software to fulfil all their IT requirements: almost all companies develop their own custom apps. The majority of these apps, whether internal or internet-facing, currently run on datacenters owned or operated locally. By the end of 2017 this will change — the majority of enterprise custom apps will…

Tips to shop safely on Cyber Monday

As consumers gear up for Cyber Monday, the largest online shopping day of the year, cybercriminals are also preparing to take advantage of deal-seekers. IBM X-Force researchers are monitoring malicious activity closely to help organizations and consumers stay safe during the holiday shopping season. Researchers have already seen cybercriminals actively masking malicious malware in emails…