2021 Verizon Data Breach Investigations Report Is Out

The Verizon Data Breach Investigations report is probably one of the most widely read reports in cyber security.  Verizon released their 2021 edition of the report on May 13, 2021.
The post 2021 Verizon Data Breach Investigations Report Is Out appeared… Continue reading 2021 Verizon Data Breach Investigations Report Is Out

Collaboration is key to a secure web application architecture

TechTarget recently ran an interview with “Web Application Security” author Andrew Hoffman, who explained the importance of a secure web application architecture and how to achieve it through collaboration between software and security engineers.
The p… Continue reading Collaboration is key to a secure web application architecture

Imperva® Opens the first dedicated DDoS scrubbing center in Santiago, Chile

Imperva is excited to be further expanding our presence in Latin America by launching a new Point of Presence (PoP) in Santiago, Chile, in partnership with leading Chilean Telecommunications provider Entel Corporations. Located within Entel’s gold-stan… Continue reading Imperva® Opens the first dedicated DDoS scrubbing center in Santiago, Chile

IT Pros Prefer Best of Breed Security vs. Single Vendor Solutions

A recent Ponemon study found that 71% of IT professionals prefer to use best-of-breed security solutions rather than get all of their security tools from a single vendor.  This finding is especially important in the light of recent security architectur… Continue reading IT Pros Prefer Best of Breed Security vs. Single Vendor Solutions

Why Software Supply Chain Attacks Are Inevitable and What You Must Do to Protect Your Applications

Most organizations have limited visibility over their software supply chain and little control of up to 95% of the software code they utilize. With multiple code sources from multiple software vendors, the number of known and unknown vulnerabilities qu… Continue reading Why Software Supply Chain Attacks Are Inevitable and What You Must Do to Protect Your Applications

60% of Organizations had an OWASP Top 10 Attack in the Last Year

An ESG report on Modern Applicaton Development Security released in August of 2020 found that 60 percent of organizations had experienced an attack on an OWASP Top 10 vulnerability in the prior 12 months.
The post 60% of Organizations had an OWASP Top … Continue reading 60% of Organizations had an OWASP Top 10 Attack in the Last Year

5 Ways Your Software Supply Chain is Out to Get You, Part 5: Hostile Takeover

We have come to the fifth and last part of this blog series on software supply chain attacks. Previously, we discussed four notorious supply chain attack methods, Vendor Compromise, Exploit Third Party Applications, Exploit Open Source Libraries, and D… Continue reading 5 Ways Your Software Supply Chain is Out to Get You, Part 5: Hostile Takeover

Cyber Attacks On The Rise For Businesses

A new report, the Hiscox Cyber Readiness Report 2021, surveyed over 6,000 companies in the U.S. and Europe and found that the number of businesses targeted by cyber criminals in the past year increased from 38% to 43%, with over a quarter of those targ… Continue reading Cyber Attacks On The Rise For Businesses

84% of Codebases Contain Open Source Vulnerabilities

A new report from Synopsys examined audit data from 1,500 + commercial codebases to examine how organizations are using open source code.  The past year with the COVID pandemic saw a significant increase from last year’s report, with the number of open… Continue reading 84% of Codebases Contain Open Source Vulnerabilities

75% of Leaders Lack Confidence in Their Web Application Security

Cymatic  released new survey results from C-suite and VP-level executives in IT and cybersecurity detailing the state of web application security. The survey included some troubling results, including the finding that 75 percent of IT leaders lacked co… Continue reading 75% of Leaders Lack Confidence in Their Web Application Security