ciso

ciso news search results

Developer news items we found relating to ciso

24 results
Implement-AI-without-data-risks

Implement AI without data risks


Tuesday, September 3, 2024 by

The Gen AI bubble might not be growing as quickly as it was in 2023, but as adoption continues apace, organizations across the globe are still being caught out by outdated security protocols. Tips to implement AI without data risks To combat the risks associated with AI and to help more organizations take advantage of it, Andrew Smith, CISO for Kyocera Document So...


Generative-AI-in-Application-Security-report-from-Checkmarx

Generative AI in Application Security report from Checkmarx


Monday, August 12, 2024 by

Checkmarx, the in-cloud-native application security provider, has published its Seven Steps to Safely Use Generative AI in Application Security report, which analyzes key concerns, usage patterns, and buying behaviors relating to the use of AI in enterprise application development. The global study exposed the tension between the need to empower both...


F5-NGINX-One-SaaS-early-access-opens

F5 NGINX One SaaS early access opens


Thursday, February 15, 2024 by

At AppWorld, we are introducing and opening "early access" for NGINX One: a global SaaS offering for deploying, securing, monitoring, scaling, and managing all NGINX instances (whether they are on-prem, in the cloud, or at the edge), and all from a single management interface. It supports all our data plane components - NGINX Plus, NGINX Open Source, NGIN...


ASPM-2024-report-from-Cycode

ASPM 2024 report from Cycode


Friday, December 15, 2023 by

Cycode announced the release of its inaugural State of ASPM 2024 report. The research found that AppSec chaos reigns, with 78% of CISOs responding that today’s AppSec attack surfaces are unmanageable and 90% of responders confirmed relationships between their security and development teams need to improve. Surprisingly, 77% of CISOs believe software supply ch...


Data-privacy-training-kit-from-CybeReady

Data privacy training kit from CybeReady


Monday, February 6, 2023 by

CybeReady published the company’s Data Privacy CISO Toolkit as Data Privacy Week is set to arrive in January. Access to the Data Privacy CISO Toolkit is free of charge and offered to support data privacy training this month. Data Privacy Week was inaugurated by the National Cybersecurity Alliance (NCA) because of the importance of privacy data. The occasion beg...


Kubernetes-performance-benchmarking-from-Speedscale

Kubernetes performance benchmarking from Speedscale


Thursday, June 2, 2022 by

Speedscale achieves expertise as part of Google’s Partner Advantage Program, helping SaaS companies optimize cloud price-performance ratio while scaling quality Speedscale, the Kubernetes traffic replay company that can simulate production conditions, announces it has successfully achieved expertise in cloud-native application development as part of Google’s...


AppSecCon-2022-dates

AppSecCon 2022 dates


Monday, May 9, 2022 by

The Purple Book Community, a community of top security leaders, announced that AppSecCon 2022 will take place May 18-19, 2022. The virtual event is expected to host thousands of leading security professionals from around the world.0 AppSecCon 2022 dates When: May 18-19, 2022 from 9 a.m. to 2 p.m. (PT) each day Where: Virtual Conference, Register Today! Presenta...


Testing-App-for-API-calls-lands-from-Speedscale

Testing App for API calls lands from Speedscale


Wednesday, January 19, 2022 by

Speedscale, the API test-automation software company, today launches Speedscale CLI, a free observability tool that inspects detects, and maps API calls on local applications or containers. The offering underscores the importance of continued and proactive API testing to quickly detect and debug defects within a shifting array of upstream and downstream interdependencie...


DevOps-predictions-for-2022

DevOps predictions for 2022


Wednesday, January 19, 2022 by

Yoav Landman, Co-Founder, and CTO of JFrog created Artifactory after 7 years as a senior consultant with AlphaCSP. He has held several senior technical roles with Attunity, Verve, and Sausage. Yoav holds a Master of Computing degree from RMIT University and a BA in Law (LLB) from Haifa University. Low-Code/No-Code, Metaverse, and DevOps predictions for 2022 Landma...


Data-privacy-predictions-from-Ground-Labs

Data privacy predictions from Ground Labs


Monday, January 17, 2022 by

As Ground Labs Co-Founder, Stephen Cavey leads a global team empowering enterprise partners to discover, manage and secure sensitive data across their organizations.  Stephen has deep security domain expertise with a focus on electronic payments and data security compliance. He is a frequent speaker at industry events such as PrivSec Global, and his expert analy...


Low-code-platform-Zenity-lands-$5M-in-funding

Low code platform Zenity lands $5M in funding


Wednesday, December 8, 2021 by

Zenity exited stealth mode with a $5 million seed funding round, led by Vertex Ventures and UpWest, and backed by top executives such as the former CISO of Google, Gerhard Eschelbeck, and former CIO of SuccessFactors, Tom Fisher. With Zenity, businesses can promote citizen development and adopt Low-Code/No-Code platforms while avoiding critical data exfiltration or disr...


Oxeye-closes-a-$5.3-Million-seed-financing-round

Oxeye closes a $5.3 Million seed financing round


Thursday, November 4, 2021 by

Oxeye announced the closing of a $5.3 Million seed financing round led by MoreVC, a seed-stage venture capital fund in Israel. The latest round includes support from i3 Equity Partners, and other cybersecurity focused investors as the company prepares to protect the world’s most popular Web applications with next-generation cloud-native Application Security Testin...


How-gamifying-security-improves-cooperation-with-developers

How gamifying security improves cooperation with developers


Monday, May 11, 2020 by

Scaling security across development challenges the most seasoned professionals. Regardless of company size or industry, risks can no longer be comfortably managed across an organization as a centralized function. Security leaders need people in other departments to understand risks and help their teams remediate and reduce them for security to be successful. Last month,...


Crowdsourced-security-and-bug-bounty-adoption-is-spreading

Crowdsourced security and bug bounty adoption is spreading


Monday, May 20, 2019 by

There continues to be a fundamental imbalance in cybersecurity. Attackers are finding new ways to penetrate cyber defenses as targets proliferate to the cloud, mobile, and connected devices. Defenders need to take a proactive security approach. The evolving threat landscape and the ever-widening security skills gap are giving rise to new approaches such as crowdsourc...


Gamification-can-transform-your-software-security-program

Gamification can transform your software security program


Tuesday, December 18, 2018 by

No matter the organization, or indeed their individual circumstances, there is one problem I have identified time and time again over the course of my career: AppSec managers, CISOs, CIOs and cybersecurity experts all over the world are rarely able to positively engage their dev teams on security best practice and training. It’s a source of conflict between teams,...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


Container-security-considerations-for-developers

Container security considerations for developers


Monday, October 29, 2018 by

On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...


Information-security-event-Black-Hat-USA-celebrates-21-years

Information security event Black Hat USA celebrates 21 years


Tuesday, August 14, 2018 by

Black Hat has highlighted their 2018 event programming and new initiatives that will help make Black Hat USA 2018 its most successful show to date. The event welcomed nearly 19,000 of the most security-savvy professionals across the InfoSec spectrum - spanning academia, world-class researchers, and leaders in the public and private sectors. The event’s robust line...


The-HBO-hack-reveals-how-vulnerable-data-is-to-black-hats

The HBO hack reveals how vulnerable data is to black hats


Thursday, August 31, 2017 by

The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...


HPE-Study-identifies-significant-barriers-with-integrating-security-and-DevOps

HPE Study identifies significant barriers with integrating security and DevOps


Tuesday, October 25, 2016 by

The HPE Application Security and DevOps Report just released, which discusses in depth where organizations are at in their implementation of DevOps, and how application security fits within this new model. While there is a perception that security and DevOps go hand-in-hand, there are significant gaps between the opportunity of incorporating security as a natural part o...


New-research-shows-that-using-advanced-security-drives-new-business-growth

New research shows that using advanced security drives new business growth


Wednesday, October 12, 2016 by

A global study from CA Technologies revealed that organizations are measuring the success of IT security beyond just breaches and compliance; they now are including business performance indicators that contribute directly to revenue growth. The study, The Security Imperative: Driving Business Growth in the App Economy, polled 1,770 senior business and IT executives, inc...


Don

Don't Expect Apple and Google to Do App Security for You


Tuesday, May 24, 2016 by

The appetite for mobile apps with an appealing user experience shows no signs of slowing – even in closely regulated industries such as financial services and healthcare. In fact, according to Gartner, by the end of 2017, IT organizations will be hard-pressed to meet market demand for mobile app development services as it grows at least five times faster than IT’s abili...


New-Study-Shows-Companies-Lacking-in-API-Security-Measures

New Study Shows Companies Lacking in API Security Measures


Friday, August 7, 2015 by

Akana has published the findings of its Global State of API Security Survey 2015 which surveyed over 250 security practitioners. Respondents including CSOs, CISOs, and security architects, with over 50% of the executives from large global organizations.The survey’s purpose was to quantify the maturity of API security practices among digital enterprises. The survey resul...


New-Telerik-Platform-Brings-First-End-to-End-Platform-for-Hybrid,-Native-and-Web-Development-Across-All-Devices

New Telerik Platform Brings First End to End Platform for Hybrid, Native and Web Development Across All Devices


Tuesday, January 28, 2014 by

Telerik announces a new Telerik Platform today, an end-to-end platform for hybrid, native and web development across all devices that adapts to any development approach—web, hybrid or native, as well as to ever-evolving app development requirements. Instead of forcing developers to choose between native, hybrid or web like most vendors, Telerik provides the first p...