Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

NTT Security, the cybersecurity company of the NTT Group, has acquired application security firm WhiteHat Security for an undisclosed sum. [Read More]
Ghidra, a reverse engineering tool developed by the NSA, has been made available for free. Its source code should also be released soon. [Read More]
VMware launches VMware Service-defined Firewall, a firewall that focuses on known good behavior rather than chasing potential threats. [Read More]
The results of a survey of 5,558 IT professionals from more than 150 countries confirm DevSecOps as a key and growing approach to effective software development. [Read More]
Tripwire launches Penetration Testing Assessment and Industrial Cybersecurity Assessment services to help organizations find vulnerabilities in their systems. [Read More]
Application security startup Cequence Security has raised $17 million in Series B funding round. To date, the company has secured $30 million in funding. [Read More]
Application security firm Contrast Security raises $65 million in a Series D funding round, which brings the total raised by the company to $122 million. [Read More]
Intel announces SGX Card, new capabilities to its Threat Detection Technology, the Host-based Firmware Analyzer tool, and the results of various partnerships. [Read More]
Offensive Security announces the release of Kali Linux 2019.1, which patches bugs and updates Metasploit to version 5.0. [Read More]
SAP's February 2019 security updates address over a dozen vulnerabilities across its product portfolio, including a Hot News flaw in SAP HANA Extended Application Services. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.