Implement AI without data risks
Tuesday, September 3, 2024 by Richard Harris
The Gen AI bubble might not be growing as quickly as it was in 2023, but as adoption continues apace, organizations across the globe are still being caught out by outdated security protocols.
Tips to implement AI without data risks
To combat the risks associated with AI and to help more organizations take advantage of it, Andrew Smith, CISO for Kyocera Document So...
Generative AI in Application Security report from Checkmarx
Monday, August 12, 2024 by Richard Harris
Checkmarx, the in-cloud-native application security provider, has published its Seven Steps to Safely Use Generative AI in Application Security report, which analyzes key concerns, usage patterns, and buying behaviors relating to the use of AI in enterprise application development. The global study exposed the tension between the need to empower both...
F5 NGINX One SaaS early access opens
Thursday, February 15, 2024 by Brittany Hainzinger
At AppWorld, we are introducing and opening "early access" for NGINX One: a global SaaS offering for deploying, securing, monitoring, scaling, and managing all NGINX instances (whether they are on-prem, in the cloud, or at the edge), and all from a single management interface. It supports all our data plane components - NGINX Plus, NGINX Open Source, NGIN...
ASPM 2024 report from Cycode
Friday, December 15, 2023 by Richard Harris
Cycode announced the release of its inaugural State of ASPM 2024 report. The research found that AppSec chaos reigns, with 78% of CISOs responding that today’s AppSec attack surfaces are unmanageable and 90% of responders confirmed relationships between their security and development teams need to improve. Surprisingly, 77% of CISOs believe software supply ch...
Data privacy training kit from CybeReady
Monday, February 6, 2023 by Freeman Lightner
CybeReady published the company’s Data Privacy CISO Toolkit as Data Privacy Week is set to arrive in January. Access to the Data Privacy CISO Toolkit is free of charge and offered to support data privacy training this month.
Data Privacy Week was inaugurated by the National Cybersecurity Alliance (NCA) because of the importance of privacy data. The occasion beg...
Kubernetes performance benchmarking from Speedscale
Thursday, June 2, 2022 by Freeman Lightner
Speedscale achieves expertise as part of Google’s Partner Advantage Program, helping SaaS companies optimize cloud price-performance ratio while scaling quality Speedscale, the Kubernetes traffic replay company that can simulate production conditions, announces it has successfully achieved expertise in cloud-native application development as part of Google’s...
AppSecCon 2022 dates
Monday, May 9, 2022 by Freeman Lightner
The Purple Book Community, a community of top security leaders, announced that AppSecCon 2022 will take place May 18-19, 2022. The virtual event is expected to host thousands of leading security professionals from around the world.0
AppSecCon 2022 dates
When: May 18-19, 2022 from 9 a.m. to 2 p.m. (PT) each day
Where: Virtual Conference, Register Today! Presenta...
Testing App for API calls lands from Speedscale
Wednesday, January 19, 2022 by Brittany Hainzinger
Speedscale, the API test-automation software company, today launches Speedscale CLI, a free observability tool that inspects detects, and maps API calls on local applications or containers. The offering underscores the importance of continued and proactive API testing to quickly detect and debug defects within a shifting array of upstream and downstream interdependencie...
DevOps predictions for 2022
Wednesday, January 19, 2022 by Richard Harris
Yoav Landman, Co-Founder, and CTO of JFrog created Artifactory after 7 years as a senior consultant with AlphaCSP. He has held several senior technical roles with Attunity, Verve, and Sausage. Yoav holds a Master of Computing degree from RMIT University and a BA in Law (LLB) from Haifa University.
Low-Code/No-Code, Metaverse, and DevOps predictions for 2022
Landma...
Data privacy predictions from Ground Labs
Monday, January 17, 2022 by Freeman Lightner
As Ground Labs Co-Founder, Stephen Cavey leads a global team empowering enterprise partners to discover, manage and secure sensitive data across their organizations.
Stephen has deep security domain expertise with a focus on electronic payments and data security compliance. He is a frequent speaker at industry events such as PrivSec Global, and his expert analy...
Low code platform Zenity lands $5M in funding
Wednesday, December 8, 2021 by Austin Harris
Zenity exited stealth mode with a $5 million seed funding round, led by Vertex Ventures and UpWest, and backed by top executives such as the former CISO of Google, Gerhard Eschelbeck, and former CIO of SuccessFactors, Tom Fisher. With Zenity, businesses can promote citizen development and adopt Low-Code/No-Code platforms while avoiding critical data exfiltration or disr...
Oxeye closes a $5.3 Million seed financing round
Thursday, November 4, 2021 by Brittany Hainzinger
Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...
How gamifying security improves cooperation with developers
Monday, May 11, 2020 by Ante Gulam
Scaling security across development challenges the most seasoned professionals. Regardless of company size or industry, risks can no longer be comfortably managed across an organization as a centralized function. Security leaders need people in other departments to understand risks and help their teams remediate and reduce them for security to be successful. Last month,...
Crowdsourced security and bug bounty adoption is spreading
Monday, May 20, 2019 by Richard Harris
There continues to be a fundamental imbalance in cybersecurity. Attackers are finding new ways to penetrate cyber defenses as targets proliferate to the cloud, mobile, and connected devices. Defenders need to take a proactive security approach.
The evolving threat landscape and the ever-widening security skills gap are giving rise to new approaches such as crowdsourc...
Gamification can transform your software security program
Tuesday, December 18, 2018 by Pieter Danhieux
No matter the organization, or indeed their individual circumstances, there is one problem I have identified time and time again over the course of my career: AppSec managers, CISOs, CIOs and cybersecurity experts all over the world are rarely able to positively engage their dev teams on security best practice and training. It’s a source of conflict between teams,...
AI for cybersecurity
Tuesday, November 27, 2018 by Richard Harris
As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...
Container security considerations for developers
Monday, October 29, 2018 by Richard Harris
On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...
Information security event Black Hat USA celebrates 21 years
Tuesday, August 14, 2018 by Austin Harris
Black Hat has highlighted their 2018 event programming and new initiatives that will help make Black Hat USA 2018 its most successful show to date. The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec spectrum - spanning academia, world-class researchers, and leaders in the public and private sectors. The event’s robust line...
The HBO hack reveals how vulnerable data is to black hats
Thursday, August 31, 2017 by Richard Harris
The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...
HPE Study identifies significant barriers with integrating security and DevOps
Tuesday, October 25, 2016 by Richard Harris
The HPE Application Security and DevOps Report just released, which discusses in depth where organizations are at in their implementation of DevOps, and how application security fits within this new model. While there is a perception that security and DevOps go hand-in-hand, there are significant gaps between the opportunity of incorporating security as a natural part o...
New research shows that using advanced security drives new business growth
Wednesday, October 12, 2016 by Austin Harris
A global study from CA Technologies revealed that organizations are measuring the success of IT security beyond just breaches and compliance; they now are including business performance indicators that contribute directly to revenue growth. The study, The Security Imperative: Driving Business Growth in the App Economy, polled 1,770 senior business and IT executives, inc...
Don't Expect Apple and Google to Do App Security for You
Tuesday, May 24, 2016 by Sinan Eren
The appetite for mobile apps with an appealing user experience shows no signs of slowing – even in closely regulated industries such as financial services and healthcare. In fact, according to Gartner, by the end of 2017, IT organizations will be hard-pressed to meet market demand for mobile app development services as it grows at least five times faster than IT’s abili...
New Study Shows Companies Lacking in API Security Measures
Friday, August 7, 2015 by Richard Harris
Akana has published the findings of its Global State of API Security Survey 2015 which surveyed over 250 security practitioners. Respondents including CSOs, CISOs, and security architects, with over 50% of the executives from large global organizations.The survey’s purpose was to quantify the maturity of API security practices among digital enterprises. The survey resul...
New Telerik Platform Brings First End to End Platform for Hybrid, Native and Web Development Across All Devices
Tuesday, January 28, 2014 by Richard Harris
Telerik announces a new Telerik Platform today, an end-to-end platform for hybrid, native and web development across all devices that adapts to any development approach—web, hybrid or native, as well as to ever-evolving app development requirements. Instead of forcing developers to choose between native, hybrid or web like most vendors, Telerik provides the first p...