Application Security

Application Security | News, how-tos, features, reviews, and videos

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall
audience listens to speaker lecture at a conference presentation

API security alerts displayed on monitors amid binary code / application security

What you need to know about the new OWASP API Security Top 10 list

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.

Application security  >  Software code + data protected with a lock

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

software development / application testing / tools in hand amid abstract code mapping

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.

teamwork / collaboration / developers / development / engineers / binary code / virtual interface

3 DevSecOps success stories

Learn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.

network security / network traffic scanning

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches.

programming code development split screen display

Lessons learned through 15 years of SDL at work

In short? Security Development Lifecycle is all about the developers...

CSO > silhouettes overlaid with a circular maze / shared perspective / empathy / collaboration

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk.

Let's Encrypt automated encryption gears

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

cyber security virus protect shield

New to autonomous security

The components, the reality – and what you can do today.

venmo data breach lock security breach circuit board by weerapatkiatdumrong getty

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security.

CSO  >  Arrows that have missed their target.

Top 8 security mistakes in SAP environments

The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks.

legos building blocks easy simple low code no code apps by iker urteaga unsplash

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.

artificial intelligence brain machine learning digital transformation world networking

Is AI fundamental to the future of cybersecurity?

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.

keeping the cloud secure cloud security lock padlock private cloud

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy.

business decision making 166291792

Developing an information security decision-making matrix

It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.

hackathon students code programmer devops certification by rawpixel unsplash

28 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.

avengers wallpaper

‘Nuff said!

The Marvel Cinematic Universe started in comic books as the creations of three main visionaries: Stan Lee, Jack Kirby and Steve Ditko. They weren’t always successful. Through following the vision of their creators, a new group was...

cubes - blocks - squares - containers - storage - repository

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting.

Load More
You Might Also Like