Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Thousands of mobile applications for Android contain hidden behavior such as backdoors and blacklists, a group of researchers has discovered. [Read More]
Twitter has informed users that some of their personal information may have been exposed due to the way Firefox stores cached data. [Read More]
Axis Security, a company that specializes in private application access, has emerged from stealth mode with $17 million in funding. [Read More]
Hellman & Friedman has agreed to acquire a majority interest in Checkmarx from Insight Partners in a deal valuing the company at $1.15 billion. [Read More]
Senators this week introduced a bill aimed at banning the use of the China-made TikTok application on government devices. [Read More]
Firefox 74 brings several security improvements, including patches, a new add-ons policy, improved privacy, and versions 1.0 and 1.1 of the TLS protocol disabled by default. [Read More]
Google this week announced the launch of FuzzBench, a free and open source service for evaluating fuzzers. [Read More]
A group of researchers has built a sandbox framework that can improve the security of Firefox by isolating third-party libraries used by the browser. [Read More]
Microsoft is testing its election-focused security solution ElectionGuard in Wisconsin at Supreme Court elections. [Read More]
MIT researchers claim that vulnerabilities in the Voatz Internet voting app could allow adversaries to alter, stop, or expose a user’s vote, but the vendor has disputed their findings. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Preston Hogue's picture
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the application landscape with real impact on security teams.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.