Enhancing Tenable.io Web Application Scanner Results

Tenable.io is one of K2’s technology partners, and K2’s vulnerability detection can enhance the testing results generated by a Tenable.io WAS test.  K2’s Security Platform is a complementary addition to Tenable.io WAS that offers 3 significant benefits… Continue reading Enhancing Tenable.io Web Application Scanner Results

Over 40% of Applications Actively Leaking Data

Security magazine recently reported on  WhiteHat Security’s AppSec Stats Flash Volume 3, the latest installment of the company’s monthly report and podcast reflecting on the current state of application security and the wider cyber threat landscape.  O… Continue reading Over 40% of Applications Actively Leaking Data

One-Third of Organizations Take No Action After Detecting a Cyber Attack

ZDNet recently wrote about some new statistics from the annual Cyber Security Breaches Survey from the Department for Digital, Culture, Media and Sport (DCMS), including the surprising statistic that 1/3 of organizations take no action after a cyber at… Continue reading One-Third of Organizations Take No Action After Detecting a Cyber Attack

Average Enterprise Runs 464 Custom Applications

According to a report published by the Cloud Security Alliance, the average enterprise has 464 custom applications deployed today.  Security for custom applications is more important than ever. It’s time to look at RASP technologies.
The post Average … Continue reading Average Enterprise Runs 464 Custom Applications

Recognizing the Risks of the Cloud

A recent article in Forbes discussed prioritizing the risks of the cloud, and specifically called out four areas of risk that need to be addressed by organizations moving to the cloud. Included were application and workload security, often overlooked b… Continue reading Recognizing the Risks of the Cloud

Six Months Left For NIST SP800-53 Compliance

Six months ago, NIST (National Institute of Standards and Technology) released a new version of their security and privacy framework, which had its last update seven years ago.  The new framework included requirements for RASP and IAST.
The post Six … Continue reading Six Months Left For NIST SP800-53 Compliance

Proving Zero Day Detection Capabilities

In today’s world of increasing zero day attacks and the increasing success of zero day attacks, the ability to detect and protect applications and workloads from zero day attacks is more important than ever. Find out about a recent test K2 ran on zero… Continue reading Proving Zero Day Detection Capabilities

280 Days to Fix a Vulnerability in Production

IBM’s 2020 report on the Cost of a Data Breach found that on average it takes 280 days to fix a vulnerability in production once a breach is discovered.  If you’ve got an application in production you may be wondering how you can protect the applicatio… Continue reading 280 Days to Fix a Vulnerability in Production

Defining Application Security

If you’re new to Application Security, you may be confused by the different terminology and where exactly Application Security fits relative to all the different phases of application development and during runtime of applications.
The post Defining Ap… Continue reading Defining Application Security

If APM Vendors Think They Need RASP, Shouldn’t You?

The start of February 2021 brought with it a number of announcements from APM (Application Performance Monitoring) vendors, all relating to RASP (Runtime Application Self-Protection).  Three vendors in the APM (referred to by some as the Observability … Continue reading If APM Vendors Think They Need RASP, Shouldn’t You?