Behavioral biometrics have evolved, and Michael Yeardley of LexisNexis Risk Solutions says the new generation of controls can not only identify the bad guy - but also "the really clever bad guy." He explains how.
Banking institutions are seeing a significant spike in multi-channel financial crimes. But Duncan Ash and Julio Gomez of Splunk say data and analytics can be key differentiators in the effort to protect sensitive financial data.
Software Development and Application Security Testing is in a significant and accelerated digital transition.
But what are some of the specific trends your team should be paying attention to?
Download this eBook interview with Checkmarx's Global Director of Application Security Strategy Matt Rose to gain insights...
A majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised, according to recent analyst research. And relying on legacy methods - like network or perimeter protection that is incapable of detecting these kinds of attacks - can have dire...
CISA is warning that sophisticated hacking groups are chaining together vulnerabilities, such as the recent Zerologon bug and other flaws, to target state and local government networks. In some cases, attackers gained access to election support systems.
Operational and cyber risk teams at financial institutions often face cyber resiliency challenges due to the complex, highly interdependent nature of their application environments. With zero-downtime applications and critical dependencies extending across new and old infrastructure, it's more difficult than ever for...
Microsoft has issued additional instructions on how to better implement a patch to fix an elevation of privilege vulnerability called Zerologon in Windows Server that affects the Netlogon Remote Protocol. The update comes as Cisco Talos researchers report a spike in attempts to exploit the flaw.
For businesses utilizing diverse software tools to support their workforce, IT consolidation is critical. Consolidation of IT tools creates the opportunity to provide better services while decreasing costs and increasing insight and security.
Download this product snapshot to learn more!
Businesses of all types and across all industries are facing increased pressure from customers, vendors and even employees to offer secure and fast wireless access. Although offering Wi-Fi is vital, it remains vulnerable to wireless threats. Networks may unknowingly allow client connections to a malicious access...
Addressing one of the most critical application security risks, Authentication is a cornerstone capability of any application.
Ensuring a user is who they say they are is crucial to maintaining data privacy and preventing fraud and data breaches. Consequently, improperly implemented authentication, known as broken...
U.S. government agencies are supposed to have patched the "Zerologon" vulnerability by now, about six weeks after Microsoft issued a patch. But CISA warns that too many agencies' systems remain unpatched.
The U.S. Commerce Department is banning the downloading and hosting of China-based social media apps TikTok and WeChat effective on Sunday, citing national security concerns. The announcement comes as Oracle continues to negotiate a deal for partnering on TikTok's U.S. operations.
In the year of accelerated digital transformation, software development is undergoing transition - and so is application security testing. Matt Rose of Checkmarx offers tips to ensure you get the most out of automating your AST solutions.