Shadow IT – as the name implies – is the installation and use of applications by employees that operate in…
Browsing: Application Security
Over two-thirds of senior technology professionals recognize global shortage of skilled cyber security workers Cybrary, the world’s first and only…
It has been reported that 16 companies from around the globe have exposed credit card data during payments to their…
Imperva Incapsula’s annual Bot Traffic Report, now in its fourth year, is a statistical study of the typically imperceptible bot…
Imperva has been in the business of protecting the high-value applications and data assets at the heart of the enterprise…
Vulnerable web application is just one of the great gifts left for hackers, as it significantly reduces their time, cost…
Veracode’s Supplement to the 2015 State of Software Security: Focus on Application Development report benchmarks application risk profiles by type…
In response to the news that Phantom Squad has threatened to take down XBox Live and PSN this Christmas using…
John Smith, principal solution architect at Veracode, calls on vendors to ensure that companies can derive actionable intelligence from cyber…
ENITSE Enterprise IT Security Conference & Exhibition will be held on 17-18 May 2016 in Istanbul, Turkey. ENITSE is one…