iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

With iOS 13, organizations can more easily distribute corporate applications to users and can integrate new single sign-on capabilities.

The post iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps appeared first on Security Intelligence.

Continue reading iOS 13 at Work, Part 1: Enabling Single Sign-On (SSO) and Distributing Custom Apps

Considering Container Security? 6 Ways to Make a Case for Containerization

Reading Time: 5 minutes Containerization can create a pathway to secure digital transformation. Discover how to make a business case for container security.

The post Considering Container Security? 6 Ways to Make a Case for Containerization appeared first on Security Intelligence.

Continue reading Considering Container Security? 6 Ways to Make a Case for Containerization

Report Identifies 6 DevSecOps Pillars

At the Black Hat USA conference, the DevSecOps Working Group of the Cloud Security Alliance (CSA) announced it has published a report identifying the six pillars on which any set of best DevSecOps processes should be based. John Yeoh, global vice pres… Continue reading Report Identifies 6 DevSecOps Pillars

Is Your Smartphone App at Risk of Infecting Users?

The time to bring in security during the application development process should not be right before launch We live in a world of threats. They’re all around us in the real world, in the air and in cyberspace. What can we do when measures we put … Continue reading Is Your Smartphone App at Risk of Infecting Users?

A Closer Look at IoT Security Solutions

IoT security looms large as more companies embrace transformational technologies Companies looking to get the most out of their mobile solutions typically employ the help of app developers, who can help in a variety of ways. Perhaps most importantly, … Continue reading A Closer Look at IoT Security Solutions

Threat Stack Embeds Application Security Monitoring Tool

Threat Stack announced it has added Threat Stack Application Security Monitoring, an application runtime protection and risk detection tool, to the Threat Stack Cloud Security platform at no additional cost to users. That capability is based on runtim… Continue reading Threat Stack Embeds Application Security Monitoring Tool

A Brief History of Containerization: Why Container Security Best Practices Need to Evolve Now

Containerization empowers businesses to move apps across different platforms and environments. But as with any new technology, failure to follow container security best practices can be costly.

The post A Brief History of Containerization: Why Container Security Best Practices Need to Evolve Now appeared first on Security Intelligence.

Continue reading A Brief History of Containerization: Why Container Security Best Practices Need to Evolve Now

AppSec Insights From Think 2019: Four Steps to Optimize Your Application Security Program

Whether you’re a small startup or an international enterprise, a successful application security program involves more than just scanning for vulnerabilities.

The post AppSec Insights From Think 2019: Four Steps to Optimize Your Application Security Program appeared first on Security Intelligence.

Continue reading AppSec Insights From Think 2019: Four Steps to Optimize Your Application Security Program

DevSecOps: Making Security a Priority From the Start

DevOps is no longer just a concept about how businesses attempt to understand how development and operations can be combined to create a single working strategy. Many development teams have begun adopting this methodology, and it’s bringing up the que… Continue reading DevSecOps: Making Security a Priority From the Start

Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design

When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.

The post Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design appeared first on Security Intelligence.

Continue reading Putting the ‘S’ in IoT: How to Make Internet of Things Solutions Secure by Design