Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Splunk has agreed to acquire alert management start-up VictorOps for approximately $120 million to help solve complex challenges facing Development and DevOps teams. [Read More]
IBM adds two new features to its MaaS360 with Watson unified endpoint management (UEM) product: Business Dashboards for Apps and Policy Recommendation Engine [Read More]
Earlier this year, a security researcher discovered that it was possible to bypass Google’s reCAPTCHA via HTTP parameter pollution. [Read More]
Vulcan Cyber emerges from stealth with $4 million in seed funding and a vulnerability remediation platform [Read More]
CERT/CC announced this week that the CERT Tapioca network traffic/MitM analysis tool has been updated with new features and improvements [Read More]
Cloudflare announced a series of improvements to its Rate Limiting distributed denial of service (DDoS) protection tool this week. [Read More]
FireEye has launched a new platform to allow organizations and pentesters check their ability to detect and respond to OAuth abuse attacks. [Read More]
As the adoption of open source components soars, vulnerabilities in this type of software have become increasingly common and they can pose a serious risk to applications, Synopsys study shows [Read More]
Serverless application security firm Protego Labs has raised $2 million seed funding from a group of investors. [Read More]
Google has released an open-source framework and software development kit (SDK) that allows developers to build applications targeting trusted execution environments. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.
Dan Cornell's picture
When security teams can assess brand, financial, strategic risks – they are best able to act as a trusted advisor to DevOps teams as they build and maintain secure systems.
Travis Greene's picture
2017 is the year for information security teams to align to the work being done in DevOps – whether you call it DevSecOps or not.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.