Security Experts:

long dotted


The European Union is offering nearly $1 million in bug bounties through the FOSSA project for vulnerabilities in 14 widely used free software projects. [Read More]
Twitter recently addressed a security vulnerability that resulted in certain applications not showing to the user all of the permissions they had. [Read More]
Tigera, a company that specializes in Kubernetes security and compliance, raises $30 million in a Series B funding round, which brings the total raised by the company to date to $53 million. [Read More]
Researchers introduce smart greybox fuzzing, a new method for finding vulnerabilities in libraries that parse complex files. A fuzzer they developed discovered over 40 flaws [Read More]
AWS launches Security Hub, a service that aggregates and prioritizes security alerts from both AWS and third-party security tools [Read More]
The United States Postal Service (USPS) has fixed an API flaw that allowed unauthorized users to view account details, including email address, username, user ID, street address, phone number and mailing campaign data for other users. [Read More]
A recent attack targeted Drupal web servers with a chain of vulnerabilities that included the infamous Drupalgeddon2 and DirtyCOW flaws, Imperva security researchers say. [Read More]
Private equity investment firm Thoma Bravo acquires Veracode from Broadcom for $950 million in cash [Read More]
The sheer quantity of weaknesses, concerns and vulnerabilities exposed by even the largest companies is far greater than most people would realize. [Read More]
Department of Defense announces new Hack the Pentagon bug bounty program that allows it to run year-long assessments for high-value systems [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.