As developers, we know that security is paramount in our projects. But with the ever-evolving nature of cyber threats, staying up to date on the latest vulnerabilities and exposures (CVEs) can be difficult. According to recent statistics, over 24,000 new...
The European Union has made significant upgrades to its cybersecurity framework in response to critical infrastructure threats. In order to make Europe a safe place to live and work, the Network and Information Security Directive 2 (NIS 2.0) aims to...
The Application Security (AppSec) landscape is constantly evolving and adapting to the changing times. As more organizations are looking to AppSec to protect their digital assets from malicious actors, AppSec trends have changed to meet the demands of modern ...
We’ve recently worked with several clients in the process of building mobile apps for their organizations. As with desktop, IoT, cloud, and browser-based apps, it is critical to secure our mobile apps before deploying to production environments. T...
Because the holidays are a joyful and festive time of year, it’s easy to let your guard down and relax your normally stringent cybersecurity standards. Unfortunately, bad actors won’t hesitate to take advantage of the holidays to attack your business. Researc...
The world of software development is constantly evolving, and legacy languages such as COBOL, Fortran, Perl, and C are becoming increasingly outmoded. Legacy languages are those that have been around for many years and are no longer actively d...
With the holiday season rapidly approaching, people all over the world will be making their lists and checking them twice to make sure they have everything they need for the most magical — but also, frequently, the most stressful — time of the year. This is e...
As cloud computing continues to experience double-digit percentage growth, security concerns remain a top priority for many organizations. With sensitive data increasingly stored in the cloud and 80% of organizations reporting a severe clo...
Two of America’s biggest and busiest shopping days — Black Friday and Cyber Monday — are just around the corner. And as you prepare to shop till you drop, cybercriminals are also hard at it, plotting new holiday hacking tricks to fleece you till you drop if y...
The holiday season brings many good things. Family, presents, decorations, joy, good cheer, peace on Earth, and so on. Unfortunately for anyone working in IT or cybersecurity, the holidays also bring something else: an increase in hacking threats and dat...
It’s that time of year again — the leaves are changing, the air is getting chilly, and cybersecurity threats are lurking around every corner. That’s right, it’s Cybersecurity Month! And what better way to celebrate than by taking a look at some of the scaries...
IBM recently released its Cost of a Data Breach Report for 2022. It’s a helpful resource that offers IT, risk management, and security leaders insight into the year’s trends surrounding data breaches. Where they happen, how they happen, what kinds of organiza...
App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.