This white paper, the 2021 update of the OWASP Top 10 list, provides guidance for mitigating critical security risks with its data-driven methodology and also defines a new wave of risk in application security that considers both app design and implementation.
Download the whitepaper and learn:
How to focus on...
Human and PerimeterX will join forces to prevent fraud and account abuse and address a broader range of use cases. The combination will create a bot mitigation monster with 450 employees, more than $100 million in annual recurring revenue and more than 500 customers across media and e-commerce.
A new assessment framework aims to help patients, healthcare providers and others examine the various privacy, security and other risks of digital health technologies, says Tim Andrews of the nonprofit Organization for the Review of Care and Health Applications, which co-developed the framework.
Building security maturity in development teams can be approached in stages. Based on Secure Code Warrior's experience with 400+ organizations, we've identified the common practices and traits in three different stages of security maturity - defining, adopting, and scaling. How security-savvy are your development...
At a time when applications are more business-critical than ever - and visibility is more challenging to achieve - we need to discuss new strategies and tools for maximizing application intelligence.
In this eBook, Sujay Pathakji of Axiom Telecom and Srudi Dineshan of Gigamon share insights on how to:
The Biden executive order on cybersecurity was a catalyst for action, with tight delivery times for steps including promotion of SBOMs and zero trust. The cyber-physical nexus and expanding threat surface mean it's not easy to maintain vigilance, but recognizing that is the first step.
Modern applications and architectures are permeating more deeply into organizations to transform back-office functions as well as those that directly affect the customer experience, according to Kara Sprague, F5's executive vice president and general manager of application delivery.
The discovery and subsequent exploitation of a critical zero-day vulnerability in Apache's Log4j open-source library has highlighted the importance of code security in today's threat landscape, says Steve Wilson, security chief product officer at Contrast.
Business-critical applications, the crown jewels of the modern enterprise, are increasingly targeted due to their significant value, and many organizations are struggling to secure them. These systems must be properly deployed, monitored and maintained, says Onapsis CEO Mariano Nunez.
Microsoft’s June rollout of security flaw fixes includes patching Follina, a zero-day exploit launched via malicious Office documents which has been spotted being exploited in the wild. From July users with E3 licenses and above will have the option of automatic updates instead of manual Patch Tuesday fixes.
Organizations face major challenges gaining visibility into networks that grow more complex by the day, and Corelight CEO Brian Dye says the open-source community can help with gathering evidence and insights from networks so that the perimeter is better secured.
The use of software-as-a-service applications has dramatically increased since the onset of the COVID-19 pandemic, and the changing consumption patterns have ushered in a new set of security challenges, according to Obsidian Security co-founder and chief product officer Glenn Chisholm.
APIs have become the fabric of the modern economy, unleashing innovation to help app teams capture mind and market share with elegant and ubiquitous digital experiences. APIs expand the threat surface considerably, however, creating more opportunities for data breaches, lost customer trust, and damaged brand. While...
It’s a challenge for organizations to balance security and usability as they deliver digital experiences. Web App and API Protection (WAAP) can help you preserve business agility and provide secure customer experiences.
Read this eBook to learn:
How changes in application design and deployment have expanded...