The issue of access management and vulnerable software applications has come back to haunt the Unique Identification Authority of India which manages the Aadhaar database containing biometrics and personal information of over 1 billion Indians.
The recent case in which Singapore's OCBC bank suffered a few hours of outage because of an apparent lack of proper monitoring could lead to bigger security issues unless the management and security team of the bank take appropriate steps.
DevOps and the addition of the "Sec" or security element to it has led to significant progress in moving security up in the application development chain, says Gartner's Dale Gardner
Achieving built-in, rather than bolted-on security at the DevOps stage through transparent orchestration is the new mantra for building resilient systems and software, says Sumedh Thakar of Qualys.
Applications run your businesses, power grids, defenses, personal and business banking, social networks, hospitals, and entertainment. They are your company's crown jewels, and they continue to be the primary target for hackers' attacks. As your business demands that software is developed faster, application security...
Artificial intelligence and machine learning will have a significant impact on lowering the cost of securing an organization because it will reduce the need for advanced skillsets, predicts Rapid7's Richard Moseley.
Although there's widespread agreement that addressing security early in the software development cycle is an essential component to any breach prevention strategy, implementing DevSecOps can prove challenging.
Open source software components may be free, but that doesn't automatically make them safe to use. "There can be risks involved," says Steve Giguere, of Synopsys, who says these risks are often compounded by the pressure to deliver goods to market quickly and with new features.
The security industry is heavily reliant on old models that are breaking down, and trying to contort old tools to meet the needs of the new hybrid environment is difficult, says Leo Taddeo of Cyxtera.
Improperly implemented foundational controls pave the way for many data breaches, says Tim Erlin of Tripwire, who offers tips on building a strong foundation.
As businesses surge ahead with agile development processes, cloud and DevOps, traditional security can no longer be the show stopper. Security needs to integrate with the DevOps process to ensure responsibility is shared and security is built in.
DevSecOps enables application security testing by the developer and by...
Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.
Applications are the #1 attack target of hackers. And according to the Verizon 2016 Data Breach Investigations Report, 82% of data breaches in the financial sector occurred through web apps.
For banks and credit unions, it's more difficult than ever before to pick an AppSec solution. It's easy to find yourself...
With modern agile development practices, such as DevOps, the time for development has been significantly reduced. So security can no longer be just a step in the process; it needs to be a continuous part of the development lifecycle, says CA Technologies' Ayman Sayed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.