Security Threats

How to join DevOps and security: Best practices in DevSecOps

How to join DevOps and security: Best practices in DevSecOps

There’s been a lot of hype around the “shift left” approach of bringing security into the software development lifecycle (SDLC) earlier than with traditional methods, and rightfully so. It’s an important change, as it gives security the attention it deserves throughout the entire SDLC, while speeding up security processes and creating more secure products.

Video conferencing security: “Zoom and doom”  demonstrates AppSec threat

Video conferencing security: “Zoom and doom” demonstrates AppSec threat

“Zoom and doom” and “Zoom bombing” are taking over headlines as the Zoom video conferencing app experiences very public security problems. As the coronavirus social distancing requirement spread, Zoom usage increased by 1,900 percent between December and March, increasing from 10 million to 200 million daily users. Zoom wasn’t ready for the increased demand and the added exposure to security threats that came with it.

Everything you need for PCI compliance scan success

Everything you need for PCI compliance scan success

If your company handles payment transactions of any type, then you’re  familiar with the Payment Card Industry Data Security Standard (PCI DSS)—a group of security standards designed to create and maintain a secure environment for any company that accepts, processes, stores, or transmits credit card information. Because we provide tools for application security, we will focus primarily on how this regulation affects companies building applications.