Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

ShiftLeft emerges from stealth mode with new solution designed to protect cloud applications and microservices, and with over $9 million in funding [Read More]
Mozilla announced plans to boost the Cross-Site-Scripting (XSS) protections in Firefox by treating data URLs as unique origin. [Read More]
Appthority report reveals which iOS and Android apps are the most blacklisted by security teams [Read More]
Analysis of 21 popular mobile stock trading apps revealed the existence of several vulnerabilities and the lack of important security features [Read More]
Equifax shares more details about the breach and how it was discovered by the company [Read More]
Around 200,000 WordPress websites were impacted after a plugin they were using was updated to include malicious code. [Read More]
Equifax confirms that an Apache Struts vulnerability exploited in the wild since March has been used to breach its systems [Read More]
SEC Consult discloses details of several vulnerabilities affecting IBM InfoSphere DataStage and Information Server [Read More]
Apache Struts 2 vulnerability reportedly exploited to hack Equifax and gain access to customer data [Read More]
Hackers have already started exploiting a recently patched remote code execution vulnerability affecting Apache Struts 2 [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.
Dan Cornell's picture
When security teams can assess brand, financial, strategic risks – they are best able to act as a trusted advisor to DevOps teams as they build and maintain secure systems.
Travis Greene's picture
2017 is the year for information security teams to align to the work being done in DevOps – whether you call it DevSecOps or not.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.
Jim Ivers's picture
Hackers are human. Hopefully that doesn’t surprise you too much. Being human means that they are subject to human tendencies, like taking the path of least resistance.
Jim Ivers's picture
Aside from tools, there are many types of application security testing that can be used to find vulnerabilities in software. An organization must consider multiple software security testing methods to really manage its risk.