Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Facebook has announced the availability of Pysa (Python Static Analyzer), an open-source tool designed for the static analysis of Python code. [Read More]
Industrial cybersecurity firm Claroty has announced the availability of AccessDB Parser, an open source tool that allows researchers to analyze Microsoft Access database files associated with SCADA applications. [Read More]
Blockchain cybersecurity startup Valid Network today announced raising $8 million in a seed funding round, bringing the total raised by the company to $10 million. [Read More]
Traceable, a company that provides a security monitoring platform for cloud applications, has emerged from stealth mode with $20 million in funding. [Read More]
Apple has announced several new privacy and security features at its 2020 Worldwide Developers Conference (WWDC). [Read More]
An analysis of the “Official Trump 2020” application revealed that keys to various parts of the app were being exposed to attacks. [Read More]
Amnesty International warns that contact-tracing technology developed to contain the novel coronavirus threatens users' privacy, highlighting Bahraini, Kuwaiti and Norwegian apps as "among the most dangerous". [Read More]
API security startup Salt Security has raised $20 million in a Series A funding round led by Tenaya Capital. [Read More]
Intel has unveiled Control-Flow Enforcement Technology (CET), a new security capability for processors that will protect systems against common malware attacks. [Read More]
AppOmni's Enterprise Essentials is designed to automate the process of achieving best security practices in each and all the major SaaS platforms, and to provide visibility into what is happening within and between cloud servers. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Preston Hogue's picture
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the application landscape with real impact on security teams.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.