Securing an application is just as important as building it in the first place. As data becomes more valuable, there are more people who want to steal it and use it for their own personal gain.
Making sure applications are indeed secure has always been a challenge, as hackers try to stay one step ahead of defenders. When organizations ran their applications in their own data centers, firewalls were an effective way of denying hackers access. The explosion of the Internet led to the creation of web applications, with entry points via the browser into client-side code that could endanger the organization.
Further, the increased speed of feature delivery in software stresses security teams trying to prevent hacks and data breaches. Today, with application modularity and edge computing increasing, along with the increased use of open-source software, that challenge has only become more difficult. Hackers now have more surface area to target than ever before. Here are the top threats organizations face as they work to secure their applications, data and systems.
IT and developers must work to ensure that their applications and systems are secure. On the development side, security touches nearly every step of the process, from the planning stage, development, to testing. The use of automation in security can help organizations stay one step ahead.
Large legacy enterprises have a data problem. Decades of iterative infrastructure updates via relatively small investments have resulted in information silos scattered across different systems and in different formats. For example, a hospital may have patient records in one location and accounting data in another. All of this data is managed by different teams with … continue reading
In order to improve cybersecurity efforts, new tools are being released this week at the RSA Conference in San Francisco. The conference brings together top cybersecurity professionals and business leaders to discuss emerging trends and formulate the best strategies for tackling current and future threats. The new tools include solutions that speed up security testing, … continue reading
The Open Cybersecurity Alliance (OCA) announced the availability of OpenDXL Ontology, its open-source language for connecting cybersecurity tools through a common messaging framework. “With open source code freely available to the security community, OpenDXL Ontology enables any tool to automatically gain the ability to communicate and interoperate with all other technologies using this language,” the … continue reading
Microsoft has announced the general availability of its cybersecurity solution. Microsoft Threat Protection (MTP) is designed to provide security checks across users, emails, applications, and endpoints. The solution alerts users and takes action using AI so that security professionals can automatically detect, investigate, and stop coordinated multi-point attacks, Microsoft explained In addition, it weeds out … continue reading
The Linux Foundation is addressing structural and security complexities in today’s modern software supply chains with the release of the ‘Vulnerabilities in the Core,’ a preliminary report and census II of open-source software. The report was put together by the Linux Foundation’s Core Infrastructure Initiative and the Laboratory for Innovation Science at Harvard (LISH). RELATED … continue reading
Facebook’s proposal to the EU to tone down what the company called “intrusive regulations,” was rejected. European commissioner for the internal market Thierry Breton said that it was up to Facebook to adopt Europe’s standards, and not the other way around. The proposal came in the form of a whitepaper, which argued to ensure accountability … continue reading
Synopsys announced that it will release a major update to the Polaris Software Integrity Platform to extend its static application security testing (SAST) and software composition analysis (SCA) capabilities through the native integration of the Code Sight plugin. The new update will allow developers to find and fix security weaknesses in both proprietary code and … continue reading
In 2011, Marc Andreessen wrote an article in the Wall Street Journal that included the now-famous phrase “software is eating the world.” Eight years on, that statement rings truer than ever. It’s not a stretch to say that software is eating the cybersecurity world as well. The fallout from not integrating security early in the … continue reading
The security of edge devices presents both a major challenge and an opportunity for building more modern edge security practices. Edge devices exist outside of the protections that IT data centers provide, according to Patrick Sullivan, the global director of security at Akamai. One of the most prominent concerns is the physical security of the … continue reading
Parasoft, the global automated software testing authority since 1987, announced today their partnership with HackEDU, an interactive cybersecurity training company. This new partnership will allow organizations to train their developers and testers on the latest threats and mitigations for modern secure software development. Parasoft offers the best in class Static Analysis Security Testing (SAST) solutions, and … continue reading
Neo4j Graph Database 4.0 has been released with a new reactive architecture to provide a “very responsive, elastic and robust” database, the company explained. In addition, the latest release features new multi-database capabilities, Neo4j Fabric, and a schema-based security model. According to Neo4j, the 4.0 release of the graph database addresses the broad and complex … continue reading
The Apache Software Foundation (ASF) is reviewing the state of security across its 300+ projects in a recently released report. According to the report, the most notable events in 2019 included increased attacks of Hadoop instances, a flaw in Apache HTTP Server 2.4, and a flaw in older versions of Apache Axis. The foundation looked … continue reading