Less than 24 hours after the Australian government released its COVID-19 contact-tracing app Sunday, nearly 2 million people had downloaded it. As security and privacy experts review the app, one outstanding question is if the public will trust it enough to reach the public health target of 10 million users.
The root cause of many successful cyberattacks lies primarily in
vulnerable software itself. The real question that needs to be asked
is, "Can the industry do a better job of writing more-secure code,
making software applications nearly impenetrable to cyberattacks?"
What's making your software essential to your...
In today's competitive world, time to market is imperative.
Organizations are under increasing pressure to continuously deliver new and improved software. To win the race, nothing can get in the way of rapid software releases. This requirement has often led organizations to leave security behind, making them an...
Outsourcing your endpoint protection can deliver positive returns by improving operational efficiency and minimizing risk, but it's not always easy to prove the business case. This guide delivers specific guidance on how to calculate savings in the context of your organization's risk while accounting for size and...
Why do enterprises still rely on incumbent technology that depends on the use of appliances anchored to the data center? It's simply because there's been no viable alternative.
Download this eBook and learn how to:
Discover new applications and protect your environment;
Use policy-based access to simplify...
Nation-state attacks. SOC automation. Zero trust. Protection of critical infrastructure. These were some of the key themes that discussed at Information Security Media Group's recent Cybersecurity Summit in Delhi.
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
Implementing the concept of "privacy design" requires a series of critical steps, says Heikki Tolvanen, chief legal engineer at PrivacyAnt, a Finland-based privacy consulting firm, who offers insights on mistakes to avoid.
The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure.
Cloud access security brokers are playing a growing role in improving visibility as more organizations rely heavily on cloud applications and more staffers gain access to them, says Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks.
The latest edition of the ISMG Security Report offers an analysis of the missteps that led to problems with the app used in this week's Democratic presidential caucuses in Iowa. Also featured: growing privacy concerns about facial recognition and business continuity tips for dealing with the coronavirus.
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of Onapsis, a vendor focused on securing business-critical applications. In this exclusive interview, DeWalt opens up on application vulnerabilities, the evolution of the nation-state threat and technologies to watch in 2020.
99.7% of web apps have at least one vulnerability. Yet, most security professionals admit their app security strategies are immature.
Download "5 Best Practices for Web Application Security: A How-To Guide" to learn:
Where you should focus to better protect apps against cybersecurity threats
Why automation is key...
The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.