Security Experts:

long dotted


Facebook introduces new settings for its mobile apps to make it easier for white hat hackers to conduct security testing. [Read More]
Mobile app security firm Blue Cedar raises $17 million in a Series B funding round. The money will be used to accelerate growth and enhance its platform. [Read More]
Google has released its Sandboxed API as open source to make it easier for software developers to create secure products. [Read More]
AV-Comparatives has analyzed 250 antimalware Android applications offered on Google Play and found that many either fail to detect threats or they are simply fake. [Read More]
Virsec's application memory firewall detects deviations in application execution caused by memory-based attacks -- and stops them instantly. [Read More]
Runtime encryption company Fortanix has launched a free and open source SDK for building Intel SGX applications. [Read More]
NTT Security, the cybersecurity company of the NTT Group, has acquired application security firm WhiteHat Security for an undisclosed sum. [Read More]
Ghidra, a reverse engineering tool developed by the NSA, has been made available for free. Its source code should also be released soon. [Read More]
VMware launches VMware Service-defined Firewall, a firewall that focuses on known good behavior rather than chasing potential threats. [Read More]
The results of a survey of 5,558 IT professionals from more than 150 countries confirm DevSecOps as a key and growing approach to effective software development. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.
Dan Cornell's picture
When security teams can assess brand, financial, strategic risks – they are best able to act as a trusted advisor to DevOps teams as they build and maintain secure systems.
Travis Greene's picture
2017 is the year for information security teams to align to the work being done in DevOps – whether you call it DevSecOps or not.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.
Jim Ivers's picture
Hackers are human. Hopefully that doesn’t surprise you too much. Being human means that they are subject to human tendencies, like taking the path of least resistance.
Jim Ivers's picture
Aside from tools, there are many types of application security testing that can be used to find vulnerabilities in software. An organization must consider multiple software security testing methods to really manage its risk.
David Holmes's picture
Considering that you can find vendors, startups, and specialists in any of these 28 application security technologies, is it realistic to expect any one person to be a subject matter expert in all of them?