Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The Forum of Incident Response and Security Teams (FIRST) announces CVSS v3.1, which aims to simplify and improve upon CVSS v3.0. [Read More]
U.S. Coast Guard recently warned commercial vessel owners and operators of malware and phishing attacks and potential vulnerabilities in shipboard systems. [Read More]
SIEM solutions provider Exabeam this week announced the acquisition of cloud application security company SkyFormation. [Read More]
Vulcan Cyber, an Israel-based startup that specializes in vulnerability remediation solutions, raised $10 million in a Series A funding round. [Read More]
Real-time application behavior analytics, control, and protection provider TrueFort has raised $13.7 million in a Series A funding round. [Read More]
Internet security firm Cloudflare has joined the “League of Entropy,” a worldwide effort of individuals and academic institutions to bring users a quorum of decentralized randomness beacons. [Read More]
macOS 10.15 Catalina brings several security-related improvements, including an enhanced Gatekeeper, a dedicated read-only volume for the OS, data protections, and support for Activation Lock. [Read More]
Cybersecurity solutions firm Imperva has agreed to acquire Distil Networks, an Arlington, Virginia-based provider of bot detection and mitigation solutions for an undisclosed sum. [Read More]
New Zealand's Treasury Secretary Gabriel Makhlouf was forced into an embarrassing backdown after police found no evidence that illegal activity was behind a data leak. [Read More]
Microsoft-owned GitHub announces several new security tools and features designed to help developers secure their code. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.
Jim Ivers's picture
Savvy organizations have learned how to use a mix of static and dynamic application security testing types to increase their coverage and lower their risk.
Dan Cornell's picture
When security teams can assess brand, financial, strategic risks – they are best able to act as a trusted advisor to DevOps teams as they build and maintain secure systems.
Travis Greene's picture
2017 is the year for information security teams to align to the work being done in DevOps – whether you call it DevSecOps or not.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.