Securing an application is just as important as building it in the first place. As data becomes more valuable, there are more people who want to steal it and use it for their own personal gain.
Making sure applications are indeed secure has always been a challenge, as hackers try to stay one step ahead of defenders. When organizations ran their applications in their own data centers, firewalls were an effective way of denying hackers access. The explosion of the Internet led to the creation of web applications, with entry points via the browser into client-side code that could endanger the organization.
Further, the increased speed of feature delivery in software stresses security teams trying to prevent hacks and data breaches. Today, with application modularity and edge computing increasing, along with the increased use of open-source software, that challenge has only become more difficult. Hackers now have more surface area to target than ever before. Here are the top threats organizations face as they work to secure their applications, data and systems.
IT and developers must work to ensure that their applications and systems are secure. On the development side, security touches nearly every step of the process, from the planning stage, development, to testing. The use of automation in security can help organizations stay one step ahead.
Security has hit a low point this year, as 2019 saw the 2nd, 3rd and 7th biggest breaches of all time measured by the number of people that were affected. The largest breach of the year occurred in May when First American Financial Corporation leaked 885 million records of documents related to mortgage deals going … continue reading
Software company Solo.io launched the WebAssembly Hub to allow users to easily add new functionalities to their service mesh. “At Solo.io, we believe that extending the functionality of your service mesh should be simple and secure,” said Idit Levine, founder and CEO of Solo.io. “This is why we’re excited about integrating Wasm with Envoy Proxy. … continue reading
As mobile APIs become more full-featured and rich, they become more dependent on data, key stores and connectivity profiles that can result in new vectors of attack. This drives the need for better security and best practices to patch up those vulnerabilities. Gartner expects that API abuse will be the number one attack vector for … continue reading
Check Point announced that it will be integrating serverless security technology into its Infinity architecture, its security solution designed to support networks, mobile, endpoint, IoT and cloud environments. The serverless security technology is provided by Protego and designed to prevent malicious attacks on serverless functions in runtime and prevent vulnerable code from being deployed into … continue reading
The Contract for the Web is officially coming to life. The contract was created by web inventor Sir Tim Berners-Lee as a global plan of action to make the online world safer and accessible by anyone. “The power of the web to transform people’s lives, enrich society and reduce inequality is one of the defining … continue reading
Fugue announced a free tier for Fugue Developer, which provides automation tools to visualize cloud infrastructure, identify misconfiguration risks, and demonstrate compliance “The cloud upended traditional IT security, forcing hard tradeoffs between agility and security,” said Phillip Merrick, CEO of Fugue. “Fugue Developer puts cloud security in the hands of the software developers building and … continue reading
As organizations start to move to the cloud and adopt multi-cloud and hybrid cloud environments, IBM wants to ensure data stays secure. The company today announced Cloud Pak for Security, a new solution that connects security tools, cloud and on-premise systems without having to move data. IBM first introduced Cloud Paks in June as a … continue reading
WhiteSource announced new and expanded support for all of the top five container registries: Docker, Amazon ECR, JFrog Artifactory, Azure Container Registry, and Google Container Registry. This allows enterprises to track vulnerabilities in file systems, installed packages, image layers and handled archive files without having to manually download and scan containers or images, according to … continue reading
GitHub wants to help protect the open-source ecosystem with the announcement of the GitHub Security Lab. The lab is designed to bring together security researchers, maintainers and companies who are dedicated to open-source security. In addition, the company will provide tools, resource bounties ,and hours of security research. “We all share a collective responsibility to … continue reading
Brave launched its new browser designed to offer users a fast browsing experience, while funding the Web through a new attention-based platform of privacy-preserving advertisements and rewards. Brave’s private ads and payment platform (Brave Rewards) is now available for iPhones and iPads in addition to desktops and Android devices. “Either we all accept the $330 … continue reading
There is currently a skills gap in cybersecurity, and companies need to go a long way to fill that gap. According to a new study from (ISC)2, the cybersecurity workforce will need to grow 145% in order to close that gap. The 2019 (ISC)2 Cybersecurity Workforce Study estimates that the cybersecurity workforce is currently made … continue reading
Google open sourced its Cardboard project that lets developers create VR experiences across Android and iOS devices. “We think that an open source model—with additional contributions from us—is the best way for developers to continue to build experiences for Cardboard,” Google wrote in a blog post. “We’ve already seen success with this approach with our … continue reading