Security Experts:

long dotted


GitHub helps developers keep the dependencies in their code secure and updated by integrating its Security Advisory API with Dependabot. [Read More]
Fortanix, a company that specializes in encrypting data and applications, raises $23 million, which brings its total funding to $31 million. [Read More]
Salt Security emerges from stealth mode with a solution designed to identify and prevent API attacks and $10 million in funding. [Read More]
WhiteHat Security launches new Essentials product line, which includes a service for quickly identifying vulnerabilities in third-party and open source components and one for automated static security testing. [Read More]
Web applications can exploit browser extensions to access privileged capabilities and steal sensitive user information, including credentials, a researcher has discovered. [Read More]
The website for a popular WordPress plugin was hacked over the weekend, when a former employee abused a previously implemented backdoor to take over the domain. [Read More]
ERP cybersecurity company Onapsis enters agreement to acquire one of its biggest competitors, Virtual Forge. [Read More]
In an effort to improve the security of websites, WordPress will display a warning starting in April 2019 when encountering outdated PHP versions. [Read More]
Check Point acquires ForceNock, a company specializing in securing web applications and APIs. [Read More]
Rapid7 announces release of Metasploit 5.0. The latest major version introduces several new features, improved performance, and extended language support. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.