5 steps to boost your application security testing ROI

5 steps to boost your application security testing ROI

Even in the era of AI hype, spending more does not necessarily means spending wiser.

How artificial intelligence fits into cybersecurity

How artificial intelligence fits into cybersecurity

Ask these questions to help distinguish between a promising machine learning technology and a marketing hype.

Newly elected French president raises questions in trying to dupe hackers

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

How CISOs can overcome cybersecurity pollution

How to assess a cybersecurity vendor in simple, unbiased and efficient manner?

RSAC 2017: The end of easy cash bounties

RSAC 2017: The end of easy cash bounties

Industry evolution eliminates chances of bug hunters to get easy cash for trivial vulnerabilities.

Ransomware 2.0: Anatomy of an emerging multibillion business

What to expect from and how to resist the fastest growing sector of cybercrime in 2017?

Shall we care about zero-day?

Gartner says that 99% of exploited vulnerabilities are publicly known. Does it mean we can ignore zero-days?

Name and shame cybersecurity: a gift for cybercriminals?

Cybersecurity “name and shame” practice may significantly boost global cybercrime.

Cybersecurity: is it really a question of when, not if?

Cybersecurity: is it really a question of when, not if?

Can you imagine your banker saying “it’s not a question of if I lose your money, but when will I lose your money”?

Fake attacks by insiders to fool companies

Famous cybercrime groups and hacktivists “brands” may be a smokescreen to cover sophisticated insider attacks.

Can crowd security testing be cost efficient for web apps?

Can Bug Bounty programs be a cost-efficient complement for security testing of modern web applications?

Infosec16: keep your cybersecurity strategy simple to win

Infosec16: keep your cybersecurity strategy simple to win

Infosecurity Europe 2016 highlighted a great variety of emerging cybersecurity threats. Keeping things simple can help CISOs a lot.

Web application security risks: Accept, avoid, mitigate or transfer?
Tip

Web application security risks: Accept, avoid, mitigate or transfer?

Web application security is a very hot topic these days. What shall CISOs do with the related risks?

Five most common myths about Web security

Five most common myths about Web security

Running behind trendy APTs we tend to forget about common-sense approach and holistic risk assessment.

Blackhole exploit kit author sent to jail: Pyrrhic victory for the cybersecurity industry

The imprisonment is rather a defeat than a victory for our industry if we carefully look into the details.

Cybersecurity spending: more does not necessarily mean better

Cybersecurity spending: more does not necessarily mean better

Cybersecurity is not something you can just buy, but something you should thoroughly build.

Why PCI DSS cannot replace common sense and holistic risk assessment

Cybersecurity compliance is not designed to eliminate data breaches or stop cybercrime.

Web Application Firewall: a must-have security control or an outdated technology?

Can WAF be an efficient security control for modern web applications?

Five rules to conduct a successful cybersecurity RFP

Five rules to conduct a successful cybersecurity RFP

It’s too early to speak about a cybersecurity bubble, however, it becomes more and more difficult to distinguish genuine security companies, with solid in-house technologies, and experts with flashy marketing and FUD (Fear,...

Facebook scandal or can bug bounties replace traditional web security?

Facebook scandal or can bug bounties replace traditional web security?

Can crowd-sourcing approach to web security testing work for your corporate applications?

Load More
Top Blog Posts