Application Security

Application Security | News, how-tos, features, reviews, and videos

Black Hat 2015
cloud security ts

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them.

security

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

woman holding up 5 fingers number 5 top five

5 best practices for securing your applications

As you begin to look for ways to secure both your legacy and new applications, consider a container platform to ensure your organization is aligned with best ways to keep your business-critical applications out of harm’s way.

security bug

What is a chaff bug? How adding bugs to apps may make them more secure

Researchers at NYU have developed a technique to add inert bugs in code to deter hackers. But could it work in reality?

orange monitors with lock icon network security cyber threat

The thin host to serverless model is radically realigning your security responsibilities

This is good news as infrastructure and network security oversight transfers to your cloud provider.

two tiny figures study dashed lines with arrows indicating different directions or paths

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

password security - locked mobile phone in hand shows lockscreen

Does the answer to better security lie in password-less experiences?

Truly password-less authentication that lets users control personal details is key to avoid identity theft and data breaches.

bucket with holes breach security vulnerability

Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says

Over nearly a decade, PHP unserialization vulnerabilities have become a popular route for cyber-criminals to plant remote code execution or deliver other malware into systems. But new research, introduced at Black Hat this month,...

mobile phone payment

What’s next in payment security?

The three fundamental changes that every card-accepting business and payment solution provider must know.

cloud computing - connections - apps - network

Securing continuous deployment for applications in the cloud

Container orchestration tools lack the necessary security controls but attribute based access control (ABAC) can help.

google cloud services

Google intends to make GCP the most secure cloud platform

If Google wants the world to know how secure Google Cloud Platform is and increase adoption, it must educate the market and turn up the competitive fire.

cwan 013 6securityreasons win10
video

6 security reasons to upgrade to Windows 10

From advanced authentication to new privacy controls, Windows 10 offers users solid security reasons to upgrade.

salted hash thumbnail multi final
video

Don't ignore application security | Salted Hash Ep 35

In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.

runners at starting line

5 tips for getting started with DevSecOps

Don't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

emerging tech ai machine learning

Security and new technology: How one company faced the unknown

A move to a pure cloud strategy at the London Stock Exchange Group forced a new security mindset. Here's how the LSEG's CISO faced the challenge.

Load More