Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Vulcan Cyber, an Israel-based startup that specializes in vulnerability remediation solutions, raised $10 million in a Series A funding round. [Read More]
Real-time application behavior analytics, control, and protection provider TrueFort has raised $13.7 million in a Series A funding round. [Read More]
Internet security firm Cloudflare has joined the “League of Entropy,” a worldwide effort of individuals and academic institutions to bring users a quorum of decentralized randomness beacons. [Read More]
macOS 10.15 Catalina brings several security-related improvements, including an enhanced Gatekeeper, a dedicated read-only volume for the OS, data protections, and support for Activation Lock. [Read More]
Cybersecurity solutions firm Imperva has agreed to acquire Distil Networks, an Arlington, Virginia-based provider of bot detection and mitigation solutions for an undisclosed sum. [Read More]
New Zealand's Treasury Secretary Gabriel Makhlouf was forced into an embarrassing backdown after police found no evidence that illegal activity was behind a data leak. [Read More]
Microsoft-owned GitHub announces several new security tools and features designed to help developers secure their code. [Read More]
ZombieLoad, RIDL and Fallout: Intel processors are vulnerable to more speculative execution side-channel attacks that can allow malware to obtain sensitive data. [Read More]
Only 1% of websites are infected with malware at any given time, but this translates to a colossal 17.6 million websites overall, a new report shows. [Read More]
WordPress released version 5.2 of the popular content management system (CMS), which includes new security and stability features. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Preston Hogue's picture
If done right and integrated throughout the process, security ends up being not a source of friction, but a function that protects the business, at the speed of business.
Ashley Arbuckle's picture
With a holistic approach you can enable efficient segmentation across your infrastructure, identify anomalies faster by using process behavior deviations, and reduce your attack surface quickly.
Preston Hogue's picture
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the application landscape with real impact on security teams.
Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.