Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A threat actor referred to as POISON CARP has targeted senior members of Tibetan groups via WhatsApp for around six months. [Read More]
Cycode, a company that specializes in protecting source code, has emerged from stealth mode with $4.6 million in seed funding. [Read More]
Windows 7 and Windows Server 2008 will officially reach end-of-support on January 14, 2020, but they will continue to receive security patches past that date, unofficially. [Read More]
Cisco Talos has released two new open source tools for IDA Pro: GhIDA, an IDA Pro plugin, and Ghidraaas (Ghidra as a Service), a docker container. [Read More]
DevOps firm CircleCI informed customers that some information that may be useful for targeted phishing attacks was exposed through a third-party analytics vendor. [Read More]
VMware announces significant enhancements, including in security, to its Virtual Cloud Network offering. [Read More]
Achieving a genuine DevSecOps environment is not easy. Speed in code generation (DevOps) is a different requirement to security in code generation, and one can hinder the other. [Read More]
Misconfiguration in JIRA project management software results in thousands of companies’ filters, dashboards and staff data being publicly exposed. [Read More]
Hackers have managed to compromise 62 colleges and universities by exploiting a vulnerability in the Ellucian Banner system. [Read More]
BlackBerry Cylance has prepared an update to address a recently disclosed bypass of its AI-based antivirus, but the company has downplayed its impact. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Preston Hogue's picture
Every piece of hardware, every integration, every API, every process, as well as applications themselves, are potential targets.
Preston Hogue's picture
Applications have been deconstructed to the point where we need to think about them with a new level of abstraction to understand how security needs to evolve.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Preston Hogue's picture
If done right and integrated throughout the process, security ends up being not a source of friction, but a function that protects the business, at the speed of business.
Ashley Arbuckle's picture
With a holistic approach you can enable efficient segmentation across your infrastructure, identify anomalies faster by using process behavior deviations, and reduce your attack surface quickly.
Preston Hogue's picture
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the application landscape with real impact on security teams.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.