Securing an application is just as important as building it in the first place. As data becomes more valuable, there are more people who want to steal it and use it for their own personal gain.
Making sure applications are indeed secure has always been a challenge, as hackers try to stay one step ahead of defenders. When organizations ran their applications in their own data centers, firewalls were an effective way of denying hackers access. The explosion of the Internet led to the creation of web applications, with entry points via the browser into client-side code that could endanger the organization.
Further, the increased speed of feature delivery in software stresses security teams trying to prevent hacks and data breaches. Today, with application modularity and edge computing increasing, along with the increased use of open-source software, that challenge has only become more difficult. Hackers now have more surface area to target than ever before. Here are the top threats organizations face as they work to secure their applications, data and systems.
IT and developers must work to ensure that their applications and systems are secure. On the development side, security touches nearly every step of the process, from the planning stage, development, to testing. The use of automation in security can help organizations stay one step ahead.
Tel Aviv, Israel, September 29, 2022 — Ox Security, the end-to-end software supply chain security platform for DevSecOps, exited stealth today with $34M in funding led by Evolution Equity Partners, Team8, and M12, Microsoft’s venture fund, with participation from Rain Capital. OX was founded less than a year ago by Neatsun Ziv and Lior Arzi, … continue reading
CloudBees acquired the ReleaseIQ DevOps Platform to expand the company’s DevSecOps capabilities and to empower customers with a low-code, end-to-end release orchestration and visibility solution. The SaaS offering enables DevOps organizations to compose and analyze workflows, and also orchestrate a combination of CI/CD technologies including Jenkins without the need to migrate or replace. “The decision … continue reading
ALISO VIEJO, Calif. – Sept. 22, 2022 – Quest Software, a global systems management, data protection and security software provider, today announced the public beta of SharePlex for PostgreSQL. SharePlex is the industry-leading database management and replication solution designed to help customers ensure high availability and facilitate the movement of data between platforms. Businesses are … continue reading
To help developers move from learning to applying that knowledge to make their code more secure, Secure Code Warrior today launched Coding Labs, to enable real-time coding in an in-browser IDE. “We found that 40% of developers don’t believe they’re receiving enough hands-on training from their current tools and resources. We’ve set out to fundamentally … continue reading
The White House issued a memorandum that requires each federal agency to comply with the NIST Guidance when using third-party software on the agency’s information systems and to inventory all software subject to its requirements within 90 days. As part of the new guidance that follows the executive order “Improving the Nation’s Cybersecurity” issued in … continue reading
Google is trying to make authentication easier and safer for developers by introducing new features to the Google Identity Services (GIS) library. “For developers, our focus has always been to offer a frictionless experience that makes it easier for users to onboard and return to partner platforms, while also helping developers create a trusted relationship … continue reading
In recent years, hackers have become very sophisticated in the ways they attack upstream development pipelines by introducing vulnerabilities into the software supply chain. The popularity of open source makes those repositories a low-hanging fruit to target. In an SD Times Live! Event titled “Threat Landscapes: An Upstream and Downstream Moving Target,” Theresa Mammarella, developer … continue reading
The threat modeling and security cloud infrastructure company, ThreatModeler, has announced the general availability of ThreatModeler 6.0. This release offers users multiple new capabilities intended to improve the threat modeling process for both security and DevOps teams. With this update comes a complete redesign of the platform’s interface, workflows, model building, and reporting based on … continue reading
The Rust Foundation, the nonprofit organization for the Rust programming language, today announced that it will be establishing a dedicated security team, underwritten by the OpenSSF’s Alpha-Omega Initiative as well as the foundation’s newest platinum member, JFrog. “There’s often a misperception that because Rust ensures memory safety that it’s one hundred percent secure, but Rust … continue reading
California Attorney General Rob Bonta has announced a settlement with the beauty brand Sephora over allegations that the company has violated California’s landmark privacy law, the California Consumer Privacy Act (CCPA). According to Bonta, it was determined after an enforcement sweep that Sephora failed to disclose to customers that the company was selling their personal … continue reading
The following is a listing of API management tool providers, along with a brief description of their offerings. Apigee is an API management platform for modernizing IT infrastructure, building microservices and managing applications. The platform was acquired by Google in 2016 and added to the Google Cloud. It includes gateway, security, analytics, developer portal, and … continue reading
The use of APIs has skyrocketed over the years and with organizations using so many different types of APIs on a normal basis, API management has become essential for managing the API attack surface. Fifty-one percent of respondents said that more than half of their organizations’ development effort is spent on APIs—compared with 40% of … continue reading