Application Security | News, how-tos, features, reviews, and videos
Organizations can now apply Rezilion’s SBOM to Windows environments to manage software vulnerabilities and meet regulatory standards.
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.
An open-source program office (OSPO) can act as both gatekeeper and evangelist in an organization’s struggle to ensure ubiquitous open-source components – incredibly useful but vulnerable to bad actors and misuse – are deployed safe
Most companies believe they are using no open-source software libraries with known vulnerabilities, but new research finds them in 68% of selected enterprise applications.
Vendor says new infrastructure-as-code (IaC) scanning features will help teams develop and run secure code as software development and supply chain security continues to be high on the agenda.
As these examples show, vulnerabilities can lurk within production code for years or decades—and attacks can come at any time.
Healthy developer-team culture and adherence to devsecops best practices to protect against supply chain attacks are surprisingly commonplace in today’s security environment, according to a report from Google Cloud's DORA research program.
Palo Alto Networks has added a new SCA solution to Prisma Cloud to help developers safely use open-source software components. The vendor has also introduced a software bill of materials.
Unpatched systems, misconfigurations and vulnerable custom code are making SAP environments a top target for cyberattacks.
Sponsored Links