Application Security

Application Security news, information, and how-to advice


cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Hacker
video

4 old malware threats still haunting business today

From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.

Info_sec
video

Learn the ins and outs of Europe's General Data Protection Regulation (GDPR)

Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at...

command line

What’s new at GitHub: dependency management, security alerts

The code-sharing site will tell users what projects depend on other projects as well as offer security alerts

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

Equifax credit bureau logo and building security breach

Why the Equifax security threat isn’t over yet

Here's what you can do to make sure your company isn't negatively affected and to protect your company's use of open source code

Hidden cloud migration gotchas

From equanimity to Equifax

What the Equifax breach should show CIOs and CISOs about open-source software quality

pt 4 image 2
video

Ransomware: What you need to know now | Salted Hash Ep 1, Pt 4

Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.

pt 2 image
video

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

pt 3 image
video

Hollywood's hacking woes | Salted Hash Ep 1, Pt 3

Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.

pt 1 image 3
video

Kaspersky Lab and the Russia connection | Salted Hash Ep 1, Pt 1

Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?

cwtt 002 ep2 pt3 img
video

GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

secret

How to keep container secrets secret

Keeping secrets secret in container-based applications is complex and challenging, but far from hopeless

Blackhat_2017
video

Chasing down leakers fast with ThinAir's asset tracking

Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of...

Blackhat_2017
video

Safeguarding power grids and other critical infrastructure from data leaks

CSO senior writer Steve Ragan talks with cybersecurity experts Krypt3ia and Kodor about how the pair seek out passwords, schematics and other sensitive documents on SCADA control system architectures that shouldn't be available...

Blackhat_2017
video

Bringing behavioral game theory to security defenses

Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data they think they're receiving. People generally make decisions by either...

Faraday_Blackhat2017
video

Simple tips to keep your devices secure when you travel

CSO security reporters Fahmida Rashid and Steve Ragan share some easy ways to keep your data and devices secure while traveling, even at the Black Hat conference, where active scanning is the norm. (And check out the built-in Faraday...

Load More