Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Pentest-as-a-Service company Cobalt has raised $29 million in a Series B funding round, which it will use to expand its platform. [Read More]
Adaptive Shield this week emerged from stealth mode to automate the security of software-as-a-service (SaaS) applications. [Read More]
Secure Access Service Edge (SASE) and Network-as-a-Service (NaaS) solutions provider Perimeter 81 has closed a $40 million Series B funding round that brings the total raised by the company to $65 million. [Read More]
Facebook has announced the availability of Pysa (Python Static Analyzer), an open-source tool designed for the static analysis of Python code. [Read More]
Industrial cybersecurity firm Claroty has announced the availability of AccessDB Parser, an open source tool that allows researchers to analyze Microsoft Access database files associated with SCADA applications. [Read More]
Blockchain cybersecurity startup Valid Network today announced raising $8 million in a seed funding round, bringing the total raised by the company to $10 million. [Read More]
Traceable, a company that provides a security monitoring platform for cloud applications, has emerged from stealth mode with $20 million in funding. [Read More]
Apple has announced several new privacy and security features at its 2020 Worldwide Developers Conference (WWDC). [Read More]
An analysis of the “Official Trump 2020” application revealed that keys to various parts of the app were being exposed to attacks. [Read More]
Amnesty International warns that contact-tracing technology developed to contain the novel coronavirus threatens users' privacy, highlighting Bahraini, Kuwaiti and Norwegian apps as "among the most dangerous". [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Gunter Ollmann's picture
CISOs are increasingly partnering with DevOps leaders and vigilantly modernizing secure development lifecycle (SDLC) processes to embrace new machine learning (ML) approaches.
Gunter Ollmann's picture
The philosophy of integrating security practices within DevOps is obviously sensible, but by attaching a different label perhaps we are likely admitting that this “fusion” is more of an emulsification.
Preston Hogue's picture
The ability to look deeply into user and system behavior and identify the smallest anomaly will become the essential toolkit to stem the tide of fraud and theft in financial services.
Preston Hogue's picture
Retailers should ensure that they are proactively scanning for vulnerabilities in the website, as well as deploying a solution to monitor traffic.
Preston Hogue's picture
Every piece of hardware, every integration, every API, every process, as well as applications themselves, are potential targets.
Preston Hogue's picture
Applications have been deconstructed to the point where we need to think about them with a new level of abstraction to understand how security needs to evolve.
Preston Hogue's picture
The best way for the security industry to meet the challenge of modern applications and modern app development is to adopt a modern way of supporting those from a security perspective.
Preston Hogue's picture
ChatOps offers a bridge to a fully realized vision for DevSecOps, offering a much quicker path to resolution for both security and non-security issues.
Preston Hogue's picture
If done right and integrated throughout the process, security ends up being not a source of friction, but a function that protects the business, at the speed of business.
Ashley Arbuckle's picture
With a holistic approach you can enable efficient segmentation across your infrastructure, identify anomalies faster by using process behavior deviations, and reduce your attack surface quickly.