Tanya Janca CEO and Founder We Hack Purple

Tanya Janca, CEO and founder of We Hack Purple joins us to discuss her new book “Alice & Bob Learn Application Security”, what inspired her to write the book, the current and future state of Application Security and much more! If you’re a fan of Ta… Continue reading Tanya Janca CEO and Founder We Hack Purple

Retail and hospitality sector fixing software flaws at a faster rate than others

The retail and hospitality sector is fixing software flaws at a faster rate than five other sectors, a Veracode analysis of more than 130,000 applications reveals. The ability to find and fix potential security defects quickly is a necessity, particula… Continue reading Retail and hospitality sector fixing software flaws at a faster rate than others

Enterprises move on from legacy approaches to software development

Application development and maintenance services in the U.S. are evolving to meet changing demands from enterprises that need dynamic applications with rich user interfaces, according to a report published by Information Services Group. The report for … Continue reading Enterprises move on from legacy approaches to software development

What is Under the Cape of a Security Champion?

There is a big conversation happening right now in the world of application security (AppSec), one that is focused on how…
The post What is Under the Cape of a Security Champion? appeared first on ZeroNorth.
The post What is Under the Cape of a Securit… Continue reading What is Under the Cape of a Security Champion?

SQL injection: The bug that seemingly can’t be squashed

If you’re in a hands-on cybersecurity role that requires some familiarity with code, chances are good that you’ve had to think about SQL injection over and over (and over) again. It’s a common vulnerability that – despite being easily remedied &#… Continue reading SQL injection: The bug that seemingly can’t be squashed

#Solorigate : SUPERNOVA forensics using Code Property Graph

#Solorigate : SUPERNOVA forensics using Code Property Graph
The fallout of SolarWinds compromise has resulted in a bevy of new malware families, each with different characteristics and behaviors.
SolarWinds advisory : https://www.solarwinds.com/securit… Continue reading #Solorigate : SUPERNOVA forensics using Code Property Graph

95% of Organizations Admit To at Least One Successful Application Exploit in Past Year

Findings and Insights from Contrast Security’s 2020 State of DevSecOps Report
The post 95% of Organizations Admit To at Least One Successful Application Exploit in Past Year appeared first on Security Boulevard.
Continue reading 95% of Organizations Admit To at Least One Successful Application Exploit in Past Year

How to make DevSecOps stick with developers

While DevOps culture has brought innovation to the industry and transformed the way software is developed, it’s arguably an outdated concept. The truth is that DevOps has allowed for new features and applications to be rolled out at such speed that tra… Continue reading How to make DevSecOps stick with developers

Under the Hood of Simon Data’s World-Class Application Security Program

Are you curious how CISOs with major data platforms handle their application security testing programs? So are we, which…
The post Under the Hood of Simon Data’s World-Class Application Security Program appeared first on ZeroNorth.
The post Under the H… Continue reading Under the Hood of Simon Data’s World-Class Application Security Program

Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVID

In 2020, “digital transformation” went from a buzzword to reality. Businesses and governments alike experienced first-hand what it meant to undergo rapid, high-stakes transformation in the way they operate, and many are still coming to terms with the i… Continue reading Seven Ways We’ve Helped our Partners Transform to Digital Reality During COVID