Application Security

Application Security news, information, and how-to advice

secret

Blackhat_2017
video

Safeguarding power grids and other critical infrastructure from data leaks

CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available...

Blackhat_2017
video

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either...

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

The dark web's changed
video

How the dark web has gone corporate

Some criminals on the dark web are taking their cues from the practices of corporate IT. Illicit offerings run the gamut from code that buyers have to implement themselves to turnkey solutions and consulting services.

Blackhat_2017
video

How DevOps and cloud will speed up security

Zane Lackey, CSO and co-founder of Signal Sciences, talks with CSO senior writer Fahmida Rashid about how DevOps and cloud can help organizations embed security into their technology structures, enabling business to move faster.

Blackhat_2017
video

Stop blaming users for security misses

Does the message to users about security need to change? Or does IT need to rebuild infrastructure so users can worry less about security? Wendy Nather, principal security strategist at Duo Security, talks with CSO senior writer...

cargo containers

How to think about Docker security

Is Docker secure? To answer that question, we need to look at the entire Docker stack

Arlo Go Netgear

Are VMs more secure than containers?

In theory, virtual machines (VMs) are more secure than containers. In practice, they probably are. It depends on how the VMs are implemented.

security check point sign

DevSecOps: Paradigm shifts are messy, but someone's got to take the lead

Companies that lead with application security have security practitioners willing and able to lead

3 patches

Microsoft kills off security bulletins after several stays

'Disappointing,' says patch expert after concluding the replacement means more work for admins

microsoft stock campus building

Microsoft fixes 45 flaws, including three actively exploited vulnerabilities

Microsoft Patch Tuesday includes fixes for critical flaws in IE, Edge, Office, Windows, and .Net

woman code laptop developer programming

Silicon Valley weighs speed versus risk in app dev

A panel featuring Atlassian, GitHub, HackerOne, and Rainforest explores how to get successful software projects completed on time without breaking things

security check point sign

Mozilla project keeps compromised apps out of circulation

The Binary Transparency plan would use public certificate technology to guarantee binaries haven't been replaced with malicious counterparts

Security online

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Software vendors will fix these vulnerabilities, but users should remember that there are always zero-day exploits out there

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do

whisper shh quiet mouth lips men antique vintage secret

Got secrets? Docker Datacenter can help your applications keep them

Docker Datacenter now supports secrets in containerized apps -- API keys, passwords, and encryption keys -- and ensures they are securely stored and transmitted

google play store

Google might be gearing up to remove millions of Play Store apps next month

The crackdown by Google, which sets a March 15 compliance date, targets apps with questionable privacy policies

Load More