application security

application security news search results

Developer news items we found relating to application security

75 results
Find bugs in your code before launch with new ReGrade platform

Find bugs in your code before launch with new ReGrade platform


Thursday, May 24, 2018 by

Let's face it, most of us do not write flawless code, and according to the U.S. Department of Homeland Security, 90 percent of security incidents result from exploits against defects in software (ouch). Curtail Security has announced the release of ReGrade. The platform helps give customers the ability to identify critical version differences in the development cycle an...


What some experts are saying about GDPR

What some experts are saying about GDPR


Friday, May 18, 2018 by

The GDPR bill is causing an uproar in the industry as the compliance date comes ever nearer. Yet few can say they actually know much about the bill that will come into place on May 25th.GDPR, or the General Data Protection Regulation, is an expansion upon the EU’s previous Data Protection Act of 1998, extending the boundary of its territorial mandate from whatever juris...


DevOps practices  more likely to integrate automated security

DevOps practices more likely to integrate automated security


Saturday, April 21, 2018 by

Sonatype published findings from its 5th annual DevSecOps Community Survey of 2,076 IT professionals. The survey shares practitioner perspectives on evolving DevSecOps practices, shifting investments, and changing perceptions.  Survey respondents with mature DevOps practices were 338% more likely to integrate automated security than organizations with no DevOps pra...


Why developers run away from security updates

Why developers run away from security updates


Monday, April 16, 2018 by

Veracode, Inc. has released new data that shines a light on the discrepancy between component security and hygiene. According to the research conducted with Vanson Bourne, only 52 percent of developers using commercial or open source components in their applications update those components when a new security vulnerability is announced. This highlights organizations’ la...


Forrester recognizes Prevoty for it's RASP

Forrester recognizes Prevoty for it's RASP


Monday, April 02, 2018 by

Prevoty is cited as the leader of runtime application self-protection (RASP) technologies in The Forrester New Wave: Runtime Application Self-Protection, Q1 2018, released recently. Analysts from the influential research and advisory firm evaluated the eight most significant RASP vendors, interviewed customers, received demonstrations, and measured each solution against...


Enterprises need a software security program

Enterprises need a software security program


Tuesday, January 30, 2018 by

The answer to the “why” enterprises need a software security program question is pretty straightforward. There are no circumstances under which any but the smallest firms can expect a collection of independent activities - a pen test here, an hour of training there, some free tools that may or may not work as advertised - will consistently result in appropriately secure...


Most cryptocurrency mobile apps are vulnerable

Most cryptocurrency mobile apps are vulnerable


Thursday, November 30, 2017 by

Over 1,300 crypto currencies exist today with over $300 Billion market capitalization. One of the most popular and oldest cryptocurrency - Bitcoin has almost reached $10,000 price after several months of fluctuation, but continuous and steady growth.A wide spectrum of mobile applications for cryptocurrencies were released during the last few years by various startups, i...


DevSecOps is important and here is why

DevSecOps is important and here is why


Friday, October 20, 2017 by

In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an...


Automated Security as a Service platform by ShiftLeft launches

Automated Security as a Service platform by ShiftLeft launches


Monday, October 16, 2017 by

ShiftLeft Inc. has introduced an automated Security as a service (SECaaS) for cloud software that creates custom security and threat detection for each application it supports. With ShiftLeft, organizations can now secure their cloud applications as part of their continuous integration pipeline, rather than merely reacting to threats discovered in production. ShiftLeft ...


Sending out an S.O.S. for SMS

Sending out an S.O.S. for SMS


Wednesday, October 04, 2017 by

What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...


Veracode announced two new key integrations

Veracode announced two new key integrations


Friday, August 11, 2017 by

Veracode, a software security company acquired by CA Technologies, has announced the Veracode HPE Application Lifecycle Manager (ALM) Flaw Synchronizer Plug-in, which empowers development and QA/release engineers to fix security vulnerabilities early in the Software Development Lifecycle (SDLC). The company also announced an enhanced integration to the Veracode Applicat...


Checkmarx acquired Codebashing

Checkmarx acquired Codebashing


Tuesday, July 25, 2017 by

Checkmarx has acquired Codebashing, an application security education company that delivers Game-like AppSec Training for Developers.Traditional secure coding education is ineffective and cannot scale to deliver continuous and across the board secure coding knowledge. Long training courses disrupt the developer’s daily routine and don't address the specific challenge as...


Software developers are easy targets for hackers study finds

Software developers are easy targets for hackers study finds


Thursday, July 20, 2017 by

Netsparker Ltd., a company in the web applications security industry, has released survey results showing that most software developers make themselves easy targets for hackers, even when they are behind a corporate firewall. The primary reason is not that their web server software is out of date, however. Instead, it is largely the result of developers running vulnerab...


With DevOps security must work differently

With DevOps security must work differently


Tuesday, June 27, 2017 by

Because “software is eating the world,” as Mark Andreessen famously noted, application security gets harder every day; every line of code written opens organizations to new vulnerabilities and breaches. Furthermore, legacy solutions, such as static analysis, dynamic analysis and web application firewalls have failed to keep pace with Agile and DevOps practices. Teams ne...


VASCO launches overlay detection in DIGIPASS

VASCO launches overlay detection in DIGIPASS


Thursday, June 22, 2017 by

VASCO Data Security International, Inc., a provider of identity, security and business productivity solutions, has announced its ability to help organizations detect and mitigate mobile application overlay attacks through added functionality in the DIGIPASS for Apps Runtime Application Self-Protection (RASP) module.Overlay attacks are increasingly being deployed to stea...


Why runtime application self-protection is critical for app security

Why runtime application self-protection is critical for app security


Tuesday, June 20, 2017 by

Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...


DevSecOps will help security and developers play nice

DevSecOps will help security and developers play nice


Thursday, June 15, 2017 by

Veracode, a security software company acquired by CA Technologies, has announced the results of a study examining the relationships between application developers and security teams.The study, conducted in conjunction with Enterprise Strategy Group (ESG), shows that despite the pervasive belief that security and development teams have conflicting priorities, initiatives...


Enterprise threat dubbed HospitalGown infests thousands of apps

Enterprise threat dubbed HospitalGown infests thousands of apps


Tuesday, June 06, 2017 by

Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...


Improve mobile app security by turning it into code

Improve mobile app security by turning it into code


Monday, May 08, 2017 by

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should als...


The hottest skills needed in the freelance job market to get hired

The hottest skills needed in the freelance job market to get hired


Thursday, May 04, 2017 by

Upwork has released its newest quarterly index of the hottest skills in the U.S. freelance job market. The Upwork Skills Index ranks the site’s 20 fastest-growing skills and is part of a quarterly series that sheds light on new and emerging skills freelancers are providing. According to a recent report, nearly half (49%) of hiring managers use freelancers to access skil...


Red Hat and Avi Networks join forces to automate the enterprise app lifecycle

Red Hat and Avi Networks join forces to automate the enterprise app lifecycle


Wednesday, May 03, 2017 by

Avi Networks has collaborated with Red Hat to simplify and automate the enterprise application development and deployment lifecycle. Through the collaboration, Avi Networks and Red Hat integrated technologies to give enterprises the combined power of a container application platform, IT automation, software load balancing, and container networking services. With the con...


Instart Logic brings Helios AI-Driven security out into the open

Instart Logic brings Helios AI-Driven security out into the open


Friday, April 28, 2017 by

In ancient mythology, Helios was the Greek god of the sun streaking across the heavens in a chariot shining much-needed light onto a dark and dangerous world. That’s exactly what Instart Logic, is doing with their latest announcement of Helios - "using artificial intelligence to illuminate and solve today’s most challenging digital security issues."Web application attac...


WhiteSource Bolt detects vulnerable open source components

WhiteSource Bolt detects vulnerable open source components


Thursday, March 30, 2017 by

WhiteSource, a continuous open source security and compliance management company, has announced the launch of a new open source management tool integrated within the Microsoft Visual Studio Team Services (VSTS) and Team Foundation Server (TFS) platforms - the WhiteSource Bolt (Bolt).Bolt is fully immersed within the VSTS and TFS products, so users can detect vulnerable ...


ImmuniWeb Mobile launches to offer better mobile security testing

ImmuniWeb Mobile launches to offer better mobile security testing


Wednesday, March 15, 2017 by

High-Tech Bridge announces the launch of ImmuniWeb Mobile as part of ImmuniWeb Application Security Testing Platform. The new offering will provide comprehensive assessment of iOS and Android mobile applications, mobile infrastructure backend and data channel encryption. All ImmuniWeb Mobile packages are provided with a zero false-positives SLA. The mobile application s...


Veracode sells to CA Technologies for $614M

Veracode sells to CA Technologies for $614M


Wednesday, March 08, 2017 by

CA Technologies announced it has signed a definitive agreement to acquire Veracode, a company that is securing web, mobile and third-party applications across the software development lifecycle, for approximately $614 million in cash. The transaction is expected to close in the first quarter of fiscal year 2018, and is subject to customary closing conditions, including ...


80 percent of web apps have security flaws

80 percent of web apps have security flaws


Tuesday, February 14, 2017 by

Data collected by Contrast Labs has revealed that sensitive data exposures, which include missing and weak encryption, are the top vulnerability plaguing 69 percent of web applications and accounting for 26 percent of all vulnerabilities. Their research has also found that 80 percent of tested software applications had at least one vulnerability, with an average of 45 v...


Checkmarx opens beta support for Scala programming language

Checkmarx opens beta support for Scala programming language


Wednesday, February 01, 2017 by

Checkmarx, an application security testing company, has announced open beta support of the Scala programming language. The new capability adds the ability to analyze and remediate security risks and vulnerabilities exposed in projects written using Scala code.The added capability not only allows the detection of vulnerabilities within Scala code, but also the ability to...


Scanning JavaScript for vulnerabilities: How the impossible is now possible

Scanning JavaScript for vulnerabilities: How the impossible is now possible


Friday, January 13, 2017 by

Javascript is everywhere, and it's awesome! But the world most popular language can be riddled with problems if you aren't a careful programmer.There is a saying that speaks to the incredible popularity of JavaScript as a programming language and it goes like this: “any application that can be written in JavaScript, will eventually be written in JavaScript.” The we...


How do we simplify east-west security? The imperative path is upon us

How do we simplify east-west security? The imperative path is upon us


Monday, December 05, 2016 by

Ahhh, the endless saga of streamlining hazards around application security: let’s talk about the East-West component of the conundrum. But first, it’s important to clarify the variances of ‘East-West’ vs. ‘North-South’ traffic in a typical data center environment. By definition: North-South traffic is the communication that occurs between server applications deploy...


Foxit WebPDF 2.0 launches with REST API and Docker support

Foxit WebPDF 2.0 launches with REST API and Docker support


Thursday, November 24, 2016 by

Foxit Software has announced the release of Foxit WebPDF Viewer 2.0. The new release includes enhanced rendering, performance and security features, equipping web developers for better customization, integration and document control.There are several performance enhancements in WebPDF 2.0, including faster parsing and rendering of local PDFs, lower levels of server stra...


New VS plugin from Checkmarx lets DevOps teams to rapidly embed security

New VS plugin from Checkmarx lets DevOps teams to rapidly embed security


Wednesday, November 16, 2016 by

Checkmarx just announced a new Checkmarx plugin for the Microsoft Visual Studio Team Services platform. The new Checkmarx (CxSAST) Microsoft Visual Studio Team Services Plugin allows organizations with agile development practices to embed security into their software development lifecycle (SDLC) without the delays traditionally caused by application security t...


Comparing server virtualization and containers

Comparing server virtualization and containers


Monday, November 14, 2016 by

Apcera is a San Francisco-based company building the next-generation container management platform, and they believe that cloud computing is an ever-evolving way of interfacing with technology. With Apcera’s platform, they aim to solve the hard problems that enterprises face in embracing the new world of containers to unlock the potential of modern architectur...


What is offline-first application design anyway

What is offline-first application design anyway


Wednesday, November 09, 2016 by

Offline first application development is the latest iteration of progressive enhancement in application development. It means creating applications to work without internet access in the most resource constrained environments like underground train stations or in remote places abroad. Features can be added to make the applications more robust once internet access is ava...


What happens to security when your apps go to the cloud

What happens to security when your apps go to the cloud


Wednesday, November 09, 2016 by

When Marc Andreessen wrote, “software is eating the world,” he meant that every business is literally turning into software. The problem is that every line of code you write makes you easier to attack. Historically, we dealt with security by putting up walls and scanning. But the complexity of modern software environments has made these approaches ineffective ...


The impact of fake retail apps hitting the Apple App Store this year

The impact of fake retail apps hitting the Apple App Store this year


Tuesday, November 08, 2016 by

Holiday retail woes have hit a little early this year, with hundreds of fake retail and product apps appearing in Apple’s App Store recently. The New York Times reports counterfeiters have disguised apps as retail chains like Dollar Tree and Foot Locker, department stores like Nordstrom and even luxury brands like Jimmy Choo. With Apple known to have a st...


RealVNC just launched VNC Connect with cloud, direct, and hybrid options

RealVNC just launched VNC Connect with cloud, direct, and hybrid options


Wednesday, November 02, 2016 by

RealVNC, the original developer and provider of VNC remote access and control software, has just announced the release of a major new remote access product called VNC Connect.  Launched at the SpiceWorld IT Conference in Austin, Texas, VNC Connect combines the convenience of a cloud service with the flexibility of direct connections, giving organizations the abilit...


HPE Study identifies significant barriers with integrating security and DevOps

HPE Study identifies significant barriers with integrating security and DevOps


Tuesday, October 25, 2016 by

The HPE Application Security and DevOps Report just released, which discusses in depth where organizations are at in their implementation of DevOps, and how application security fits within this new model. While there is a perception that security and DevOps go hand-in-hand, there are significant gaps between the opportunity of incorporating security as a natural part o...


The use of vulnerable open source components putting more software at risk

The use of vulnerable open source components putting more software at risk


Tuesday, October 18, 2016 by

Veracode has released the findings in its annual State of Software Security Report (SoSS). The seventh edition of the report presents metrics drawn from code-level analysis of billions of lines of code across 300,000 assessments performed over the last 18 months. The report revealed that the continued and persistent use of components in software development is creating ...


Security First: 5 tips for building a secure mobile app from the ground up

Security First: 5 tips for building a secure mobile app from the ground up


Wednesday, October 05, 2016 by

With more than two billion smartphone users worldwide, the app market has exploded — along with risks. Mobile app developers are still struggling to make security a priority and by 2017, cyber-attacks via vulnerable apps are anticipated to account for 75% of all mobile security breaches. Given what's at stake, it's critical that developers build apps that are &ldq...


App Marketers Will Lose up to $100 Million in 2016 Because of Fraud

App Marketers Will Lose up to $100 Million in 2016 Because of Fraud


Friday, September 23, 2016 by

AppsFlyer has released new data forecasting that app marketers will lose up to $100 million in 2016 due to mobile app install and engagement advertising fraud - as well as revealing the countries that have the highest rates of this type of ad fraud. The study’s findings are based on the company’s new anti-fraud technology, called DeviceRank, which also just la...


Hewlett Packard Enterprise Introduces New Application Security Solutions

Hewlett Packard Enterprise Introduces New Application Security Solutions


Monday, September 19, 2016 by

Hewlett Packard Enterprise (HPE) has introduced the HPE Fortify Ecosystem and Fortify on Demand (FoD) continuous application monitoring service. The online marketplace and service are designed to help organizations create secure applications by naturally integrating security testing processes and resources throughout the fast-paced software development lifecycle (SDLC)....


Why Big Data Could Also Mean Big Security Breaches for Insurance Companies

Why Big Data Could Also Mean Big Security Breaches for Insurance Companies


Friday, September 02, 2016 by

Quadrant Information Services is warning that digitization is a two-edged sword: with increased capability comes an increased danger of expensive—and possibly actionable—data security breaches.Big Data has been one of the largest growing developments for insurance. Car insurance companies, for instance, used to price policies based on only 10 to 20 rate bearing fac...


Checkmarx Tells Us Why App Developers Should Care About App Security

Checkmarx Tells Us Why App Developers Should Care About App Security


Thursday, August 18, 2016 by

We recently had a conversation with Emmanuel Benzaquen at Checkmarx to talk about how they are able to scrutinize code with a fine-toothed comb and find vulnerabilities early and why other developers need to be doing the same. With clients such as Coca-Cola, SAP, and Salesforce, they seem to be carving out a niche for application security in the crowded tech-s...


Synopsys Makes Updates to its Seeker Runtime Security Analysis Tool

Synopsys Makes Updates to its Seeker Runtime Security Analysis Tool


Monday, August 08, 2016 by

Synopsys has released the latest version of its Seeker runtime security analysis solution. Seeker analyzes web application code and data flows at runtime using a technique known as an Interactive Application Security Testing (IAST), which detects and confirms exploitable security vulnerabilities and provides insight that allows developers to address their root causes. T...


Cloud Security Alliance Issues Mobile Application Security Testing Report

Cloud Security Alliance Issues Mobile Application Security Testing Report


Monday, August 01, 2016 by

The Cloud Security Alliance has released a new report surrounding its Mobile Application Security Testing Initiative. The purpose of the report is to provide the Alliance’s insight into building out a roadmap for establishing a more secure cloud ecosystem to protect mobile applications.The Alliance’s Mobile Application Security Testing (MAST) Initiative offers...


WaveMaker Adds Security Enhancements to Its Rapid Application Development Platform

WaveMaker Adds Security Enhancements to Its Rapid Application Development Platform


Friday, July 15, 2016 by

WaveMaker has announced two new security enhancements to its enterprise-class Rapid Application Development platform. The WaveMaker platform now supports Single Sign-on for WaveMaker-built and deployed applications using Central Authentication Server (CAS), which permits users to access multiple applications by providing credentials such as UserID and password only once...


Why There Is a Huge Gap Between IT and Security Professionals

Why There Is a Huge Gap Between IT and Security Professionals


Wednesday, June 15, 2016 by

Prevoty surveyed over 1,000 IT and security professionals to learn how companies are approaching application security on a daily basis, as well as the type of struggles these individuals experience and what they would change about the process.The findings show there seems to be a disconnect between IT and security professionals as can be seen from the followin...


Prioritizing Proactivity in a Complex IT World

Prioritizing Proactivity in a Complex IT World


Friday, June 10, 2016 by

As a business’s technology infrastructure grows in complexity, IT teams struggle to take a proactive approach to infrastructure monitoring. Furthermore, the C-suite is placing more emphasis on IT’s responsibility to drive the business forward, adding additional pressure to the need to get ahead of performance problems or system outages before they occur. We sat dow...


Orasi Software and Saltworks Security Form New Application Security Venture

Orasi Software and Saltworks Security Form New Application Security Venture


Monday, June 06, 2016 by

Orasi Software and Saltworks Security have announced an agreement to form a new cooperative venture, where Orasi will contribute quality-focused solution sales, support, consulting and training services that leverage Saltworks application security services. The resulting collaboration will offer an all-inclusive security offering of planning, deployment, training and on...


F5 Networks Introduces New Security Functionality to DevOps Software

F5 Networks Introduces New Security Functionality to DevOps Software


Wednesday, May 18, 2016 by

F5 Networks has launched new software-based solutions that give companies the opportunity to take advantage of the benefits provided by traditional data center, cloud, and hybrid architectures.The new products include:BIG-IP 12.1 software: Offers application services with enhanced public cloud integration and security policies for on-premises and hybrid cloud environmen...


Application Security Market to Triple in the Next 5 Years

Application Security Market to Triple in the Next 5 Years


Wednesday, May 11, 2016 by

A new market research report has been published by MarketsandMarkets which predicts that the global application security market size is expected to triple, growing from $2.24 Billion in 2016 to $6.77 Billion by 2021. The report is titled “Application Security Market by Component (Solutions, Services), Solutions (Web Application Security, Mobile Application Security), Te...


Five Common Mobile App Security Vulnerabilities - And How to Fix Them

Five Common Mobile App Security Vulnerabilities - And How to Fix Them


Saturday, April 30, 2016 by

Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. As mobile app usage conti...


Department of Homeland Security Creates Mobile Application Playbook

Department of Homeland Security Creates Mobile Application Playbook


Tuesday, April 26, 2016 by

The U.S. Department of Homeland Security (DHS), Office of the Chief Technology Officer (OCTO), has created The Mobile Application Playbook (MAP), a DHS sponsored reference guide to assist federal agencies with the planning, management, and execution of mobile application projects.The MAP publication provides a roadmap for creating mobile applications and is designed to ...


Deploying New Applications is a Top Driver for Identity and Access Management

Deploying New Applications is a Top Driver for Identity and Access Management


Tuesday, April 19, 2016 by

SecureAuth Corporation has published results of a survey on enterprise priorities within the identity and access management (IAM) market. The research was conducted in association with Decision Analyst and received responses from 230 IT security professionals in the U.S. and U.K.    When asked why their company has initiated new identity projects in the past...


Study Shows Developers Wield Clout When Choosing an Organization’s Technology

Study Shows Developers Wield Clout When Choosing an Organization’s Technology


Wednesday, March 30, 2016 by

According to a recent survey, developers are playing a critical role in determining the IT technologies used by companies today. The annual “Future of Application Development and Delivery Survey” was performed by NGINX and received responses from more than 1,800 IT professionals.According to the survey report, 74 percent of respondents said developers are responsible fo...


Security Startup Provider buguroo Launches New Threat Intelligence Platform

Security Startup Provider buguroo Launches New Threat Intelligence Platform


Wednesday, February 17, 2016 by

Security provider buguroo, a U.S. startup and spinoff of Deloitte’s European Security Operations Center (SOC), is launching bugThreats, a threat intelligence platform (TIP) that looks outside the enterprise infrastructure and focuses on useful intelligence gathered where the compromised end users, and their stolen data, are.Focused on intelligence and not protection, bu...


Cloud Based Apps to Provide Big Returns for Companies in 2016

Cloud Based Apps to Provide Big Returns for Companies in 2016


Saturday, December 26, 2015 by

Appian recently surveyed over 300 IT decision makers to provide insight into how companies will approach mobilizing their businesses in 2016. The survey was conducted by Harris Poll. According to the resulting report, a majority of the respondents believe cloud-based applications/solutions (70%) and enterprise mobility (61%) will provide the top returns to in 2016,...


HP Gives Top 5 Predictions for Changes Coming to DevOps in 2016

HP Gives Top 5 Predictions for Changes Coming to DevOps in 2016


Tuesday, December 01, 2015 by

It has long been a cliché to say that we’re living in a digital revolution. But it’s also truer with every day that passes. Savvy businesses are using the rapid pace and malleability of software to drive more and more differentiation into the marketplace. They’re using instant feedback from users to improve software continuously. And increasingly, they’re doing thi...


New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities

New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities


Tuesday, November 10, 2015 by

Checkmarx and AppSec Labs have released a new mobile app security titled “The State of Mobile Application Security 2014-2015”. Among the findings of the report is that the typical app is exposed to an average of 9 different vulnerabilities. The report also indicates in situations where vulnerabilities are built into the code or application logic, the vulnerability of iO...


Checkmarx Creates Campaign to Help Companies With Security Awareness

Checkmarx Creates Campaign to Help Companies With Security Awareness


Tuesday, October 13, 2015 by

Checkmarx has release a new microsite to help companies raise awareness within their development teams for secure development practices. The campaign provides a kit that includes physical and online tools to promote safe application development within their organization.The physical kit offers a package to help raise awareness within a development organization for appli...


AppSecUSA Security Conference to Delve Into Application and Cloud Security

AppSecUSA Security Conference to Delve Into Application and Cloud Security


Friday, September 11, 2015 by

There is still time to participate in OWASP's 12th Annual AppSecUSA Security Conference designed for developers and security experts focusing on application and cloud security. The conference will be held in San Francisco on September 24-25 and a separate two day training program will be offered September 22-23.Held at the Hyatt Regency San Francisco, more than 40 speak...


New Report Highlights Wide Ranging Cybersecurity Challenges

New Report Highlights Wide Ranging Cybersecurity Challenges


Wednesday, September 02, 2015 by

Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...


How Frightened Should Android Developers Be Of Stagefright

How Frightened Should Android Developers Be Of Stagefright


Wednesday, July 29, 2015 by

Stagefright is a new Android vulnerability which was found and announced by Joshua J. Drake, Zimperium zLabs Vice President of Platform Research and Exploitation. Specifically the company says Stagefright is: “…what we believe to be the worst Android vulnerabilities discovered to date.”Here is a rundown according to Zimperium, “These issues in Stagefright code criticall...


Kony Updates MobileFabric To Help The Enterprise With Mobile Development

Kony Updates MobileFabric To Help The Enterprise With Mobile Development


Thursday, July 23, 2015 by

Kony has updated its MobileFabric backend mobile infrastructure with new API management, mobile a management (MAM), analytics and application performance management (APM) capabilities.The updates provide developers greater access to open and web development standards and technologies offering front-end tools and frameworks, including native iOS, Android, Windows, HTML5/...


Study Shows 60 Percent of Security Vulnerabilities Are Not Fixed

Study Shows 60 Percent of Security Vulnerabilities Are Not Fixed


Friday, June 26, 2015 by

Waratek recently surveyed senior security professionals to ascertain the current climate of security and risk management for enterprises. According to the results, two-thirds of senior security professionals polled said they remediate 40 percent or less of the security vulnerabilities discovered by software application security testing (SAST) tools. Other findings ...


Contrast Security Release New Enterprise Application Security Platform

Contrast Security Release New Enterprise Application Security Platform


Tuesday, June 09, 2015 by

Contrast Security has release Contrast Enterprise, a new application security product to integrate defenses across development and operations, offering vulnerability assessment, security visibility and attack protection throughout the application lifecycle. Contrast Enterprise offers Runtime Application Self-Protection (RASP), which provides deep security instrumen...


HP Releases New Solutions for Mobile App Development and Management

HP Releases New Solutions for Mobile App Development and Management


Tuesday, April 07, 2015 by

HP has announced a number of new software releases that utilize HP's assets in big data analytics, application lifecycle management, IT operations management and security. Businesses can use HP's solutions to accelerate application delivery, test and monitor apps across multiple devices and operating systems, and provide mobile users with secure experiences.Measure the ...


 Checkmarx Releases New CxRASP Platform Offering Runtime Application Self Protection

Checkmarx Releases New CxRASP Platform Offering Runtime Application Self Protection


Friday, February 06, 2015 by

Checkmarx has announced the launch of its Runtime Application Self-Protection (RASP) solution, CxRASP, which utilizes two-point instrumentation technology to continuously observe an app’s bidirectional data flow, enabling the detection and defense against real-time attacks.CxRASP is the latest addition to the Checkmarx Application Security Hub which provides solutions f...


NowSecure App Testing (formerly ViaLab) Launches New Mobile Application Security Testing Suite

NowSecure App Testing (formerly ViaLab) Launches New Mobile Application Security Testing Suite


Friday, January 23, 2015 by

NowSecure App Testing (formerly ViaLab) has announced its new mobile application security testing suite, available in both a free and paid version.The mobile application security testing suite speeds up the process of identifying vulnerabilities and risks for third-party and custom mobile apps. The platform helps developers locate problems such as Heartbleed before they...


Mobile Devices Are the Weakest Link for Enterprise Mobility Solutions

Mobile Devices Are the Weakest Link for Enterprise Mobility Solutions


Tuesday, December 09, 2014 by

The time has come when the fact is accepted and discussed at large, the one that we have been trying to resist since long. We all are aware that today mobile Apps for Enterprise Management consider mobility at their core. It has given new peripheries to businesses by transforming operations – better engagement with customers – and of course an innovative appro...


MetaIntelli and Arxan Technologies Partner to Identify and Mitigate Mobile Apps Security Threats

MetaIntelli and Arxan Technologies Partner to Identify and Mitigate Mobile Apps Security Threats


Sunday, November 16, 2014 by

MetaIntelli and Arxan Technologies have partnered together to provide mobile app developers with a comprehensive approach to identify and mitigate mobile apps against security and privacy risks with nonstop protection. The two companies bring together complementary technologies that leverage MetaIntelli’s intelligent, autonomic cloud based mobile app risk identific...


A Look Ahead: The Top Ten Strategic Technology Trends for 2015

A Look Ahead: The Top Ten Strategic Technology Trends for 2015


Wednesday, November 05, 2014 by

Its time for the prognosticators to get out their crystal balls and make predictions for 2015. And as it relates to the top 10 technology strategic trends, Gartner has done just that. Gartner defines a strategic technology trend as one with the potential for significant impact on an organization in the next three years. Factors that denote significant impact includ...


5 Things To Consider When Monitoring Your App

5 Things To Consider When Monitoring Your App


Friday, October 17, 2014 by

Mobile is explosive in nature. That being said, it has been shown more than once that across verticals, it’s very expensive to be naïve as to the expected user adoption when it comes to mobile applications. You quickly come to realize you need to understand the behavior of the application in production. Mobile monitoring is materially different from web monitoring,...


LANDESK Offers New App Wrapping Capabilities to Its Enterprise Mobility Management Platform

LANDESK Offers New App Wrapping Capabilities to Its Enterprise Mobility Management Platform


Wednesday, October 08, 2014 by

LANDESK has announced the release of new features and upgrades to its Enterprise Mobility Management platform, including an application wrapping feature. This new feature will allow IT departments to add another layer of security to the enterprise apps they supply to their users.The solution allows an IT administrator to wrap an application in one step and deploy it to ...


HP Launches Cloud Managed Application Self Protection Service

HP Launches Cloud Managed Application Self Protection Service


Friday, September 12, 2014 by

HP has introduced HP Application Defender, a cloud-managed application self-protection service that provides immediate visibility and actively defends production applications against attacks.As HP said in the recent announcement, “As the number and complexity of enterprise applications grows, the attack surface for exploits increases exponentially, leaving enterpri...