Application security insights and invitations to exclusive events in your inbox
Your data will stay confidential
Join our 12793 followers
Addressing Shadow IT, legacy and abandoned applications for a holistic risk management program.
Dr. Maria Bada, Cambridge Cybercrime Centre, explains the intricate nature of global cybercrime, its prevention and prosecution under international and national law.
In the second part, we dive into product deployment and maintenance practice to integrate security into the DevOps process.
In this deeper-dive series, we will more closely examine the practicalities and challenges of each of Gartner’s suggested steps for DevSecOps adoption.
Abandoned, shadow and legacy applications undermine cybersecurity and compliance of the largest global companies despite growing security spending.
DevOps is a growing and useful paradigm in web application development, but it fails to address the security issues plaguing today’s marketplace. The principles of DevOps, ...
APIs and Web Services are widely used by modern mobile applications. Often underprotected, they are a common source of critical flaws and data breaches.
How attackers are getting into millions of WordPress websites and how to prevent this?
Equifax breach, WannaCry and NotPetya epidemics exploited flaws in shadow, legacy and abandoned applications. By definition, these applications cannot be patched, and thus pose a ...
Over 30% of the world's websites are currently built with the WordPress. From complex e-commerce sites to small personal blogs – all are targets for hackers.
This is our deep dive into aspects of OWASP’s #3 top ten web application risks: sensitive data exposure. We’ve looked at cloud database access misconfigurations; at preventing ...
Spencer Young, Regional Vice-President EMEA at Imperva, explores challenges and opportunities on the emerging application security market.