The importance of implementing security scanning in the software development lifecycle

Veracode published a research that finds most applications are now scanned around three times a week, compared to just two or three times a year a decade ago. This represents a 20x increase in average scan cadence between 2010 and 2021. Scan frequency … Continue reading The importance of implementing security scanning in the software development lifecycle

Low code applications are essential for cybersecurity development in applications

One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as part of the automated development lifecycle, rather than relying on security or… Continue reading Low code applications are essential for cybersecurity development in applications

6 cloud security trends to watch for in 2022

It’s fascinating to take a step back and look at how “the cloud” developed over the last two decades. There has been a lot of innovation that has sparked a new wave of technologies – from the boom in serverless technologies (allowing firms to sca… Continue reading 6 cloud security trends to watch for in 2022

Shifting security further left: DevSecOps becoming SecDevOps

Veracode has revealed usage data that demonstrates cybersecurity is becoming more automated and componentized in line with modern software architectures and development practices. The analysis of 5,446,170 static scans and more than 310,000 apps over a… Continue reading Shifting security further left: DevSecOps becoming SecDevOps

How to implement security into software design from the get-go

Software professionals know that the working relationship between developers and security teams can be complicated. Most security professionals feel it’s part of a programmer’s role to write code securely, but most developers get next to no support to … Continue reading How to implement security into software design from the get-go

Public Wi-Fi Security: Is It Safe to Use for Business?

Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to […]

The post Public Wi-Fi Security: Is It Safe to Use for Business? appeared first on Security Intelligence.

Continue reading Public Wi-Fi Security: Is It Safe to Use for Business?

Public Wi-Fi Security: Is It Safe to Use for Business?

Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to […]

The post Public Wi-Fi Security: Is It Safe to Use for Business? appeared first on Security Intelligence.

Continue reading Public Wi-Fi Security: Is It Safe to Use for Business?

Putting the “sec” in DevSecOps: An overall reduction of risk

In this Help Net Security interview, Cindy Blake, Senior Security Evangelist at GitLab, talks about the importance of integrating security in DevSecOps and how to overcome the complexity of such integration. Security in DevOps is often being neglected…. Continue reading Putting the “sec” in DevSecOps: An overall reduction of risk

Securing open-source code supply chains may help prevent the next big cyberattack

The headline-making supply chain attack on SolarWinds late last year sent a shock wave through the security community and had many CISOs and security leaders asking: “Is my software supply chain secure?” After months of analysis, we know that many (som… Continue reading Securing open-source code supply chains may help prevent the next big cyberattack

What is challenging secure application development?

A Censuswide report reveals the biggest security challenges that application security (AppSec) managers and software developers are facing within their organizations in today’s threat landscape. Report findings are based on online survey input from two… Continue reading What is challenging secure application development?