Category Archives: Application Security

Cybersecurity’s people problem: More millennials needed

Faced with a growing shortage of workers, the cybersecurity industry needs to figure out how to attract a new wave of talent. Nearly one third of organizations are not able to fill their cybersecurity positions, according to a recent survey by the cybersecurity nonprofit ISACA. For another 25 percent, the process takes six months. The […]
Read More »

As cities get smarter, hackers become more dangerous: This could stop them

As governments create smarter cities, they need cybersecurity measures built from the ground up — or they risk costly data breaches which could compromise the privacy of their citizens. In 2016 alone, cyber-crime cost the global economy more than $450 billion and over two billion personal records were stolen, according to the chief executive of […]
Read More »

Congress Mulls SME Cybersecurity Legislation

A bill that would encourage SMEs to follow cybersecurity guidelines is making its way through Congress as an addition to existing legislation encouraging the same of large corporates. Reports this week said the bill, the Main Street Cybersecurity Act, is an update to the existing Cybersecurity Enhancement Act of 2014 and would seek for the […]
Read More »

Top 10 cybersecurity best practices

More than 4 billion electronic records were stolen in 2016, the result of more than 4,000 data breaches, according to a new report from Risk Based Security. That brings the number of records stolen by hackers to an all-time high. Today, every business — regardless of size, industry or location — is at risk for […]
Read More »

Private sector’s national cybersecurity strategy contributions lacking

The private sector operates much of U.S. critical infrastructure, but is it doing enough to further national cybersecurity strategy efforts designed to protect these assets? The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity […]
Read More »

Rugged devops: Build security into software development

Devops is transforming how developers and operations teams work together to deliver better software faster. At its core, devops is about automation. When several tasks in development, testing, and deployment are automated, developers can make changes to code and deploy to production frequently. Amazon, a leading devops proponent, at one point claimed to have more […]
Read More »

A team of hackers has changed the future of computing forever

In a large ballroom inside the Paris Hotel in Las Vegas earlier this month, the next leap forward in the digital revolution took place in front of a crowd of hundreds of hackers in town for theDef Con security conference. There wasn’t a charismatic CEO on stage who would demonstrate a revolutionary new smartphone, nor was there an […]
Read More »

Security Study: Developer Rush To Release Increases App Risk

The explosive growth of mobile apps and the shift to cloud computing are increasing security risks at the application level, a problem that organizations can overcome by hiring skilled developers and lessening the “rush to release,” according to a new report. That report — Application Security in the Changing Risk Landscape — was released yesterday […]
Read More »

Health Application Vulnerabilities Are Top IT Executive Concern

“What we saw in the most recent attacks made a lot of us rethink how secure our systems are.” Potential health application vulnerabilities, such as those on mobile and cloud-based applications, is a top concern among healthcare IT executives, according to a recent HIMSS and Veracode survey. HIMSS and Veracode interviewed 200 healthcare IT executives […]
Read More »

Network security vs. app security: What is the difference and why does it matter?

Cloud computing and mobile applications have expanded the boundaries of the enterprise network, but those applications must also be secured. If you’re familiar with the film The NeverEnding Story, then you know that the goal of the hero, Atreyu, was to reach the boundaries of Fantasia. He’s disappointed to learn that Fantasia has no boundaries […]
Read More »