High number of security flaws found in EMEA-developed apps

Applications developed by organizations in Europe, Middle East and Africa tend to contain more security flaws than those created by their US counterparts, according to Veracode. Across all regions analysed, EMEA also has the highest percentage of ‘high… Continue reading High number of security flaws found in EMEA-developed apps

Code alterations more prevalent in Android apps than iOS

57% of all monitored apps are under attack, with gaming (63%) and FinServ (62%) apps facing the highest risk, according to Digital.ai. The study found no correlation between an app’s popularity and likelihood of being attacked but found Android apps ar… Continue reading Code alterations more prevalent in Android apps than iOS

What AppSec and developers working in cloud-native environments need to know

All enterprise organizations are, in essence, software publishers, regardless of their industry. This is because every enterprise relies on custom software applications for managing internal processes, interacting with customers, or analyzing data, mak… Continue reading What AppSec and developers working in cloud-native environments need to know

CrowdStrike to Acquire Application Intelligence Startup Bionic

The cash-and-stock transaction provides capabilities for CrowdStrike to beef up its enterprise cloud security portfolio.
The post CrowdStrike to Acquire Application Intelligence Startup Bionic appeared first on SecurityWeek.
Continue reading CrowdStrike to Acquire Application Intelligence Startup Bionic

Generative AI lures DevOps and SecOps into risky territory

Application security leaders are more optimistic than developer leaders on generative AI, though both agree it will lead to more pervasive security vulnerabilities in software development, according to Sonatype. According to the surveyed DevOps and Sec… Continue reading Generative AI lures DevOps and SecOps into risky territory

Intel Capital Bets on Zenity for Low-Code/No-Code Security

Israeli security startup Zenity banks $16.5 million in new venture capital funding to work on ‘low-code/no-code’ security technology.
The post Intel Capital Bets on Zenity for Low-Code/No-Code Security appeared first on SecurityWeek.
Continue reading Intel Capital Bets on Zenity for Low-Code/No-Code Security

Baseline standards for BYOD access requirements

49% of enterprises across Europe currently have no formal Bring-Your-Own-Device (BYOD) policy in place, meaning they have no visibility into or control over if and how employees are connecting personal devices to corporate resources, according to a Jam… Continue reading Baseline standards for BYOD access requirements