Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

IBM Security Connect is a new cloud platform that brings together data, applications and tools from over a dozen vendors [Read More]
Google is shutting down the consumer version of its Google+ online social network after fixing a bug exposing private data in as many as 500,000 accounts. [Read More]
Facebook provides update on recent hacker attack. The company says there is no evidence the attackers accessed any apps using the compromised tokens [Read More]
"Credential Stuffing is growing fast," Rich Bolstridge, chief strategist for financial services at Akamai Technologies, told SecurityWeek. "In March and April 2018 we logged over 6 billion malicious login attempts. By May and June, this had risen to more than 8 billion attempts." [Read More]
BGP (Border Gateway Protocol) routing isn’t secure and organizations should embrace Resource Public Key Infrastructure (RPKI) to improve security, Cloudflare says. [Read More]
Rapid7 adds automation and orchestration capabilities to its Insight Platform, and new automation functionality to vulnerability management and incident response tools [Read More]
Payment card data from customers of hundreds of e-commerce websites may have been stolen after the MageCart threat actors managed to compromise customer engagement service Feedify. [Read More]
Instagram this week announced new features to boost account security and provide users with increased visibility into accounts with a large number of followers. [Read More]
Semmle, a company whose software engineering analytics platform is used by Microsoft, Google, NASA and others, launches globally with $21 million in funding [Read More]
NCC Group releases Singularity of Origin, an open source tool that makes it easier for penetration testers and others to perform DNS rebinding attacks [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.