Application Security

Application Security news, information, and how-to advice

4 encryption keys
WhatsApp secure messaging on a mobile phone

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

medical x ray imaging hands

X-ray your SaaS apps to reveal hidden security vulnerabilities

Best practices to understand security evaluations what is happening "under the hood" of cloud/SaaS applications.

NetworkSecurity

IT, OT and IoT: existential technology lifecycle management

If you give companies a way to make more money by making it clear that we only buy products that have been tested, approved and include security maintenance plans, those companies will rise to the occasion and work hard to get your...

cloud apps

Cloud functions present new security challenges

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

blue padlock in circle pixels digital security padlock

When security and privacy overrule convenience

Organizations can enable end-to-end API security with OAuth, OpenID Connect and ABAC.

data protection

Cybersecurity outlook: data protection takes center stage

From an ever-increasing uptick in data breaches to the rise of Cybercrime-as-a-Service, data protection will continue to be top of mind for CIOs and their teams through 2018 and beyond.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

containers port ship boat

Containers are here. What about container security?

ESG data indicates that cybersecurity pros have problems around the nuances of container technology and implementing container-centric security controls.

passwords

Will WebAuthn replace passwords or not?

Or, the password is dead – long live the password.

security

RSA 2018 conference recap

Memories from the greatest information security show on earth.

cubes - blocks - squares - containers

Fact vs. fiction: 6 myths about container security

Quell these myths to find default security and secure coding at the heart of well-architected containers.

email bullseye with three red arrows

Researchers warn PGP and S/MIME users of serious vulnerabilities

A professor at Münster University issued a warning on Sunday about serious vulnerabilities in PGP and S/MIME – two widely-used methods for encrypting email – which, if exploited, could reveal plain text communications. The issue also...

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

cowboy shootout

The good, the bad & the ugly of using open source code components

Component use in development is here to stay. But so are the vulnerabilities lurking in these code snippets. What do developers think about this? Are they concerned, are they frustrated? What’s their take on this problem? We recently...

Will LaSala
video

Defending against mobile technology threats | Salted Hash Ep 24

What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and...

agile devops

How lean development improved software security at Fannie Mae

Continual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.

rsa conference 2017

Quick take-aways from the RSA Security Conference

Last week's RSA Security Conference had good discussions and industry focus, but there was too much hype -- and there's lots of work ahead.

Load More