Application Security

Application Security | News, how-tos, features, reviews, and videos

cubes - blocks - squares - containers - storage - repository

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting.

Facebook Data Debacle - Android

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies.

hot and cold fire and ice clash temperature

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

Define your organization's culture

Verizon builds a DevSecOps culture with its developer dashboard

Verizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.

rocket launch startup cloud success growth

12 of the hottest startups at the RSA Conference 2019

These RSAC Early Stage Expo startups bring fresh cybersecurity solutions to fight phishing, improve application security, provide better cloud protections, enforce security policy, more accurately authenticate and more.

australia law legal

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

one lightbulb glowing among a pack of unlit bulbs

RSAC Innovation Sandbox 2019: Cloud, identity, application security take center stage

Take note of these startups. Innovation Sandbox has been around for 15 years. A whopping 42 percent of finalists from its first ten years have been acquired. Finalists in the past five years have received $1.5B in funding.

blue green abstract finger print identity bio security fingerprint

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data.

mobile apps

Data Privacy Day 2019

GDPR was just the beginning. It started in the EU, but it’s waking up the world on just how much our privacy is being violated.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Take time to think about security amidst the greatest gadget show on the planet – CES

Let us put our thinking caps back and ask the right questions.

8 authentication basics password identity protected security

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most.

Facebook / privacy / security / breach / wide-eyed fear

What the recent Facebook exposé can teach security leaders

The biggest social media snafu of the year has lessons for enterprise security professionals.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair

13 top application security tools

Checking for security flaws in your applications is essential. These tools can help find and fix them.

hand holding paper cloud for google cloud logo

What is SQL injection? How SQLi attacks work and how to prevent them

SQL injection is a type of attack that can give an adversary complete control over your web application database by inserting arbitrary SQL code into a database query.

woman holding up 5 fingers number 5 top five

5 best practices for securing your applications

As you begin to look for ways to secure both your legacy and new applications, consider a container platform to ensure your organization is aligned with best ways to keep your business-critical applications out of harm’s way.

security bug

What is a chaff bug? How adding bugs to apps may make them more secure

Researchers at NYU have developed a technique to add inert bugs in code to deter hackers. But could it work in reality?

orange monitors with lock icon network security cyber threat

The thin host to serverless model is radically realigning your security responsibilities

This is good news as infrastructure and network security oversight transfers to your cloud provider.

two tiny figures study dashed lines with arrows indicating different directions or paths

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

Load More