NIST SP 800-53 Revision 5 Released – Next Generation Security and Privacy Controls

Draft 5 of SP 800-53 closed its comment period back in May, and was just released as SP 800-53 Revision 5 on September 23, 2020 in its final form.
The post NIST SP 800-53 Revision 5 Released – Next Generation Security and Privacy Controls appeared firs… Continue reading NIST SP 800-53 Revision 5 Released – Next Generation Security and Privacy Controls

The Top 5 Needs of DAST Testing

DAST testing is an important part of the application development process, but there are some significant areas for improvement. We’ll talk about five areas that need help and how K2 can improve your DAST testing experience.
The post The Top 5 Needs of… Continue reading The Top 5 Needs of DAST Testing

NIST SP 800-53 Gets One Step Closer to Becoming a Standard

Draft 5 of SP 800-53 closed its comment period back in May, and SP 800-53B was released shortly afterwards in July of 2020, and opened its comment period, which just closed on September 11, 2020, moving it one step closer to becoming a standard.
The po… Continue reading NIST SP 800-53 Gets One Step Closer to Becoming a Standard

The Top 5 Programming Languages for Security Admins to Learn

A new article from Tech Republic covers the top 5 programming languages for security administrators to learn, along with the reason for each
The post The Top 5 Programming Languages for Security Admins to Learn appeared first on K2io.
The post The Top … Continue reading The Top 5 Programming Languages for Security Admins to Learn

The Importance of Fixing and Finding Vulnerabilities in Development

There are important reasons why an organization would want to find and remediate as many vulnerabilities as possible during the development cycle, including security, cost, and time.
The post The Importance of Fixing and Finding Vulnerabilities in Deve… Continue reading The Importance of Fixing and Finding Vulnerabilities in Development

Is This Town Big Enough for Security AND Compliance?

In our final installment of a six-part series for CISOs who are looking to survive the “Wild West” of application security,…
The post Is This Town Big Enough for Security AND Compliance? appeared first on ZeroNorth.
The post Is This Town Big Enough for… Continue reading Is This Town Big Enough for Security AND Compliance?

More Attackers Using Zero Day Exploits

A new report shows an increase in the use of zero day exploits by cyber criminals, and their use by a more diverse group of cyber criminals.
The post More Attackers Using Zero Day Exploits appeared first on K2io.
The post More Attackers Using Zero Day… Continue reading More Attackers Using Zero Day Exploits

New Article on How to Start with DevSecOps

Github just published an informative guide to moving to DevSecOps.The Github article makes good points and provides clarification on how to shift left
The post New Article on How to Start with DevSecOps appeared first on K2io.
The post New Article on H… Continue reading New Article on How to Start with DevSecOps

Welcome to the Boomtown of Strong Application Security

Have you been following our blog series guiding CISOs through the “Wild West” of application security? This is our fifth…
The post Welcome to the Boomtown of Strong Application Security appeared first on ZeroNorth.
The post Welcome to the Boomtown of S… Continue reading Welcome to the Boomtown of Strong Application Security