Application Security

Application Security | News, how-tos, features, reviews, and videos

audience listens to speaker lecture at a conference presentation
avengers wallpaper

cubes - blocks - squares - containers - storage - repository

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting.

Facebook Data Debacle - Android

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies.

hot and cold fire and ice clash temperature

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

Define your organization's culture

Verizon builds a DevSecOps culture with its developer dashboard

Verizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

australia law legal

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

tt19 003 thumbnail
video

What's ahead for cybersecurity in 2019: TECH(talk)

J.M. Porup, senior writer at CSO online, joins Juliet on this week's episode of TECH(talk) to discuss trends in ransomware, IoT security and enterprise cybersecurity roles.

security

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

blue green abstract finger print identity bio security fingerprint

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data.

mobile apps

Data Privacy Day 2019

GDPR was just the beginning. It started in the EU, but it’s waking up the world on just how much our privacy is being violated.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Take time to think about security amidst the greatest gadget show on the planet – CES

Let us put our thinking caps back and ask the right questions.

8 authentication basics password identity protected security

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

Facebook / privacy / security / breach / wide-eyed fear

What the recent Facebook exposé can teach security leaders

The biggest social media snafu of the year has lessons for enterprise security professionals.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them.

Load More
You Might Also Like