According to a report by Information Security Buzz, ransomware attacks during Black Friday 2021 rose to a staggering 495 million globally. With Black Friday 2022 just around the corner, experts predict there will be a new record this year. With … Read more
Cybersecurity
Zero-Trust Model and Secretless Approach: A Complete Guide
As organizations shift more of their workloads and data to the cloud, they face new security challenges. The cloud presents a unique set of challenges for security teams, who must now deal with a more complex and dynamic attack surface. One of these … Read more
5 Things You Cannot Miss When Setting Up Your Cloud Security Checklist
The adoption of cloud-based software, platforms and infrastructure has expanded massively in recent years and the trend looks set to continue. Cloud infrastructure services, for example, are forecast to grow by 30.5% in 2023 compared to 2022. It's no … Read more
Security First: Getting Started With Minimum Secure Products
Minimum Secure Products or Minimum Viable Secure Product (MVSP) are guidelines and criteria for creating enterprise or market-ready solutions or services. It consists of a checklist with best practices to follow. The objective is to ensure that B2B … Read more
Tips to Deliver a Strong Cybersecurity Assessment Report
When done correctly, security assessment reports reduce risk and enable businesses to decide where to improve their cyber defenses. In essence, a security assessment report contains conclusions and suggestions. It concerns weaknesses in an IT … Read more
How to Implement a Security Testing Program For Web Applications
As a web app developer, you have enough on your plate already. But with cybercrime on the rise – with 86% of companies experiencing at least one successful cyberattack in 2021 – it’s become more important than ever to test your own security … Read more
Security Testing 101: 9 Tried And Tested Ways to Find Security Flaws in Your Software
Software vulnerabilities can be devastating to your business. All it takes is one cyber attack or phishing scam to tarnish your reputation, bring your organization to a standstill, and prompt your customers to leave en-masse. After all, consumers … Read more
Threat Modeling for Digital Applications: A Quick Guide
Threat Modeling is a security design process to identify potential threats that may impact web and mobile digital applications and determine the correct controls to produce effective countermeasures. Discover essential steps, concepts, and best … Read more
7 Cybersecurity Threats You Must Know as a Web Developer
Technology and web development are constantly evolving. Right along with it, cybercriminals have become experts at devising new and sophisticated attack methods. Web developers need to understand how these attacks work so they can patch any … Read more
Red Team vs Blue Team Exercise: Its Role in Finding Your Cybersecurity Flaws
What Is the Red Team Vs Blue Team Exercise? The red team vs blue exercise is an industry-standard exercise for testing security processes. It originated from a military ‘wargames’ model. The strategy pits the teams against each other in … Read more
Automating Cybersecurity With Machine Learning
Artificial intelligence and its subfield machine learning play vital roles in cybersecurity today. It is not easy for a business to build robust cybersecurity systems without including these pieces of technology in its plans. Machine learning offers … Read more
7 Ways to Optimize SCADA Cybersecurity
As the name implies, Supervisory Control and Data Acquisition (SCADA) networks house critical systems — including computers and applications — that control, facilitate, or handle essential services. They’re used to manage many critical infrastructure … Read more
Why Has Web App Security Become a Major Concern in Recent Times?
Web Application Security: Importance and Tools to Secure your Product Web applications are being attacked and the number has just increased in recent times. There is an increase of more than 800% on web applications … Read more
Want to Hack a Boat? IoT Connected Ships Drown in Security Vulnerabilities
Table Of ContentsFrom the theory of complex systems to ship securityThe challenge of ship securityThe problems are more complex than bad actors How easy is it to hack these ship systems? How is the maritime industry … Read more
4 Interesting Facts Your Hiring Team Should Know about Cybersecurity
As society continues to move more and more online, cybersecurity is becoming increasingly crucial to protecting your business. With the myriad of digital attacks threatening your online security and the integrity of your business, it's critical that … Read more
The Lifecycle of a Remote Code Execution Security Incident
It's not always easy to understand the trust value of a penetration testing until a critical security incident happens to you. Last year at Codemotion Rome, Giovanni Mellini is Head of Information, systems, and network security at ENAV S.pA., … Read more
Security Is Not Just the Responsibility of the Security Manager
The following article was inspired by some of the best talks we had the opportunity to host during our offline conferences over the last few years. Together, they offer a broader view of the aspects related to Security. We have committed … Read more
Does open source software have a security problem?
You'd be hard-pressed to find a day where a cybersecurity incident doesn't hit the news, whether it's hackers accessing personal data, undertaking a DDoS attack or deploying ransomware. Over the years, security breaches have crippled industries, … Read more
So you want to work in cybersecurity?
There's never been a better time to become a cybersecurity professional. Whether you're working for a bank, startup, government organization, or running your own business, cybersecurity as a career means you'll always be in demand. But how do you get … Read more
How using cryptography helps to reduce the attack surface on data
Hi, I’m Anastasiia Voitova and I gave a talk about cryptography and risk management at Codemotion Milan 2018. I am product engineer in cryptographic software company Cossack Labs – we create developer-friendly software to protect data and to help … Read more