Application Security

Application Security | News, how-tos, features, reviews, and videos

mobile apps
virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

8 authentication basics password identity protected security

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

Facebook / privacy / security / breach / wide-eyed fear

What the recent Facebook exposé can teach security leaders

The biggest social media snafu of the year has lessons for enterprise security professionals.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

Black Hat 2015

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them.

security

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

woman holding up 5 fingers number 5 top five

5 best practices for securing your applications

As you begin to look for ways to secure both your legacy and new applications, consider a container platform to ensure your organization is aligned with best ways to keep your business-critical applications out of harm’s way.

security bug

What is a chaff bug? How adding bugs to apps may make them more secure

Researchers at NYU have developed a technique to add inert bugs in code to deter hackers. But could it work in reality?

orange monitors with lock icon network security cyber threat

The thin host to serverless model is radically realigning your security responsibilities

This is good news as infrastructure and network security oversight transfers to your cloud provider.

two tiny figures study dashed lines with arrows indicating different directions or paths

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

password security - locked mobile phone in hand shows lockscreen

Does the answer to better security lie in password-less experiences?

Truly password-less authentication that lets users control personal details is key to avoid identity theft and data breaches.

bucket with holes breach security vulnerability

Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says

Over nearly a decade, PHP unserialization vulnerabilities have become a popular route for cyber-criminals to plant remote code execution or deliver other malware into systems. But new research, introduced at Black Hat this month,...

mobile phone payment

What’s next in payment security?

The three fundamental changes that every card-accepting business and payment solution provider must know.

cloud computing - connections - apps - network

Securing continuous deployment for applications in the cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help.

google cloud services

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

Load More