One-Third of Organizations Take No Action After Detecting a Cyber Attack

ZDNet recently wrote about some new statistics from the annual Cyber Security Breaches Survey from the Department for Digital, Culture, Media and Sport (DCMS), including the surprising statistic that 1/3 of organizations take no action after a cyber at… Continue reading One-Third of Organizations Take No Action After Detecting a Cyber Attack

Average Enterprise Runs 464 Custom Applications

According to a report published by the Cloud Security Alliance, the average enterprise has 464 custom applications deployed today.  Security for custom applications is more important than ever. It’s time to look at RASP technologies.
The post Average … Continue reading Average Enterprise Runs 464 Custom Applications

Recognizing the Risks of the Cloud

A recent article in Forbes discussed prioritizing the risks of the cloud, and specifically called out four areas of risk that need to be addressed by organizations moving to the cloud. Included were application and workload security, often overlooked b… Continue reading Recognizing the Risks of the Cloud

Six Months Left For NIST SP800-53 Compliance

Six months ago, NIST (National Institute of Standards and Technology) released a new version of their security and privacy framework, which had its last update seven years ago.  The new framework included requirements for RASP and IAST.
The post Six … Continue reading Six Months Left For NIST SP800-53 Compliance

Proving Zero Day Detection Capabilities

In today’s world of increasing zero day attacks and the increasing success of zero day attacks, the ability to detect and protect applications and workloads from zero day attacks is more important than ever. Find out about a recent test K2 ran on zero… Continue reading Proving Zero Day Detection Capabilities

Why the Demand for Application Development Security Skills Is Exploding

Application development security is a key task when it comes to looking to the future of cybersecurity. A recent industry study shows it is the fastest-growing cybersecurity skill for the year ahead. Demand is expected to increase by 164% over the next five years. Such growth would bump up the total number of job openings […]

The post Why the Demand for Application Development Security Skills Is Exploding appeared first on Security Intelligence.

Continue reading Why the Demand for Application Development Security Skills Is Exploding

280 Days to Fix a Vulnerability in Production

IBM’s 2020 report on the Cost of a Data Breach found that on average it takes 280 days to fix a vulnerability in production once a breach is discovered.  If you’ve got an application in production you may be wondering how you can protect the applicatio… Continue reading 280 Days to Fix a Vulnerability in Production

Defining Application Security

If you’re new to Application Security, you may be confused by the different terminology and where exactly Application Security fits relative to all the different phases of application development and during runtime of applications.
The post Defining Ap… Continue reading Defining Application Security

Most Security Pros Think a WAF is High Maintenance

Web Application Firewalls (WAFs) are a traditional application security tool used by many organizations in their arsenal against the cyber attacks inflicted on a continual basis on their infrastructure.  When they were introduced, they were seen as the… Continue reading Most Security Pros Think a WAF is High Maintenance

A New Book to Learn About Application Security

If you’re just starting out as an application developer or you’re a seasoned developer looking for a good review guide, there’s a new book from Wiley titled “Alice and Bob Learn Application Security” to assist with learning about the fundamentals of ap… Continue reading A New Book to Learn About Application Security