Application Security

Application Security news, information, and how-to advice

mind the gap sign

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

cssh 013.00 22 53 39.still001
video

DJI's bounty problems and video surveillance programs | Salted Hash Ep 13

Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Hacker
video

4 old malware threats still haunting business today

From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.

Info_sec
video

Learn the ins and outs of Europe's General Data Protection Regulation (GDPR)

Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at...

command line

What’s new at GitHub: dependency management, security alerts

The code-sharing site will tell users what projects depend on other projects as well as offer security alerts

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

Equifax credit bureau logo and building security breach

Why the Equifax security threat isn’t over yet

Here's what you can do to make sure your company isn't negatively affected and to protect your company's use of open source code

Hidden cloud migration gotchas

From equanimity to Equifax

What the Equifax breach should show CIOs and CISOs about open-source software quality

pt 4 image 2
video

Ransomware: What you need to know now | Salted Hash Ep 1, Pt 4

Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.

pt 2 image
video

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

pt 3 image
video

Hollywood's hacking woes | Salted Hash Ep 1, Pt 3

Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.

pt 1 image 3
video

Kaspersky Lab and the Russia connection | Salted Hash Ep 1, Pt 1

Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?

cwtt 002 ep2 pt3 img
video

GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

secret

How to keep container secrets secret

Keeping secrets secret in container-based applications is complex and challenging, but far from hopeless

Blackhat_2017
video

Chasing down leakers fast with ThinAir's asset tracking

Tony Gauda, CEO of ThinAir, talks with CSO senior writer Steve Ragan about how the ThinAir system tracks which users within an organization have seen each piece of data, spotting anomalous information and quickly finding the source of...

Load More
You Might Also Like