Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

HIPAA Compliant Mobile App Development: Features, Risks and Checklists

The wide penetration of internet facilities has its imprint on almost all sectors, including the healthcare industry. With most people using smartphones, the demand for online applications is tremendously increasing. As a result, people are shifting towards tele-medication and treatment. However, every successful product has its drawback. Likewise, the popularity of healthcare applications has also captivated more security threats.

UK's automated self-check-outs using Age Verification API

Self-checkout kiosks are automated devices that enable consumers to scan and pay for their products without the help of a cashier. By this point, we’ve all encountered them. They are frequently seen at supermarkets, department shops, and other retail locations where it is possible to skip tedious manual check-out.

Teaching an Old State Analyzer Some New Tricks

Tripwire’s Energy and NERC Compliance Working Group virtual event offered some enlightening information, not only from industry experts but also some candid thoughts from current Tripwire customers. Even the most cogent summary of the keynote, as well as two of the sessions, simply cannot do proper justice to the knowledge that was shared during the event.

6 Reasons You Need to Run SCA Scans on Projects in VS Code

We love open-source software (OSS). Not only does it save time and effort, but it’s also incredibly rewarding to collaborate with other developers on major projects. Plus, it opens the door for innovation that otherwise wouldn’t be possible at this scale. However, with code comes responsibility, and so it’s imperative to understand the risk OSS libraries carry when we’re integrating them into projects.

6 Common Phishing Attacks and How to Protect Against Them

Going into 2023, phishing is still as large a concern as ever. “If it ain’t broke, don’t fix it,” seems to hold in this tried-and-true attack method. The 2022 Verizon Data Breach Investigations Report states that 75% of last year’s social engineering attacks in North America involved phishing, over 33 million accounts were phished last year alone, and phishing accounted for 41% of social engineering compromise overall.

Forrester Research: Show, Don't Tell, Your Developers How To Write Secure Code

If you’re a CISO, VP of Security, or a Staff Security Engineer and still wondering whether your developers own the keys to application security, this Forrester report is for you. Get your complimentary copy now, courtesy of GitGuardian.

Container security best practices: Your guide to securing containers

Over the last few years, there has been a huge adoption of containers. Actually, container technologies have existed for a while, but in 2013, the launch of Docker gave popularity to containers. Docker shows organisations how they can go for container-first development and operations mode. But along with the increase in the use of containers or growth of containers, the risks associated with them also increased.

New Feature: AG Level Controls

Two years ago, Kovrr took a unique approach to cyber risk modeling of financial quantification (FQ) and expanded to the enterprise market. After a long time of quantifying risks of portfolios for global insurers and reinsurers, Kovrr was able to build expertise around quantifying risk with specific expertise in acquiring high-quality data to feed our models and fast time to value using automation.

Chrome "Symstealer" Vulnerability Puts 2.5 Billion Users at Risk

An analysis of the way in which symlinks are handled by Google’s Chrome browser and other web browsers that use the Chromium web browser project revealed a vulnerability that can result in the theft of sensitive data including crypto wallets and cloud provider credentials. It is dubbed CVE-2022-3656. The issue was partially fixed in Chrome 107 and fully redressed in Chrome 108.