There’s been a lot of hype around the “shift left” approach of bringing security into the software development lifecycle (SDLC) earlier than with traditional methods, and rightfully so. It’s an important change, as it gives security the attention it deserves throughout the entire SDLC, while speeding up security processes and creating more secure products.
Security Threats
Video conferencing security: “Zoom and doom” demonstrates AppSec threat
“Zoom and doom” and “Zoom bombing” are taking over headlines as the Zoom video conferencing app experiences very public security problems. As the coronavirus social distancing requirement spread, Zoom usage increased by 1,900 percent between December and March, increasing from 10 million to 200 million daily users. Zoom wasn’t ready for the increased demand and the added exposure to security threats that came with it.
What are the application security trends impacting your enterprise?
Attacks on applications aren’t going away. In fact, there was a 40 percent increase in attacks from August to September of this year. Enterprises must remain diligent, learning about the latest application security trends and developments.
Why vulnerability prioritization is a key component of the best cyber security strategies
There are many components required to create and carry out an effective cyber security strategy. Enterprises need to use the right tools, possess the right knowledge, plan appropriately, and have well-qualified staff on hand to execute.
CISO’s Guide: How to build a secure application strategy and prevent data breaches
One of the biggest challenges facing CISOs today is how to build a secure application strategy. It’s no simple feat to build an application security strategy that is both comprehensive and effective. But it’s essential, as a breach can be quite costly to the organization.
What CISOs need to know about application security and cyber risk management
Every Chief Information Security Officer (CISO) knows how important risk management is for the health and safety of the business. Enterprise applications and software systems are under a permanent state of threat, making application security and cyber risk management...
Everything you need for PCI compliance scan success
If your company handles payment transactions of any type, then you’re familiar with the Payment Card Industry Data Security Standard (PCI DSS)—a group of security standards designed to create and maintain a secure environment for any company that accepts, processes, stores, or transmits credit card information. Because we provide tools for application security, we will focus primarily on how this regulation affects companies building applications.
Don’t leave security behind in your CI/CD environment
Continuous Integration (CI) and Continuous Delivery (CD), or CI/CD, are part of the Agile approach to software development. The most prominent aspect of Agile development—and it’s most important rule—is that it requires software development to be responsive to change through an iterative process.
How to keep your banking apps compliant under the new NYDFS cybersecurity regulations
Some predict that cybercrimes will cost $6 trillion in damages per year by 2021. In response, governments around the world have decided to fight back against cyberattacks and counter threats with a host of new cybersecurity regulations for financial services.
Get the best application security without breaking the bank
Gartner expects global enterprise security spending to increase 8% from 2017, reaching a total of $96.3 billion in 2018. Increased awareness of security threats (thanks to more high-profile breaches at companies such as Equifax) and regulatory compliance are two of...