Over 40% of Applications Actively Leaking Data

Security magazine recently reported on  WhiteHat Security’s AppSec Stats Flash Volume 3, the latest installment of the company’s monthly report and podcast reflecting on the current state of application security and the wider cyber threat landscape.  O… Continue reading Over 40% of Applications Actively Leaking Data

One-Third of Organizations Take No Action After Detecting a Cyber Attack

ZDNet recently wrote about some new statistics from the annual Cyber Security Breaches Survey from the Department for Digital, Culture, Media and Sport (DCMS), including the surprising statistic that 1/3 of organizations take no action after a cyber at… Continue reading One-Third of Organizations Take No Action After Detecting a Cyber Attack

Average Enterprise Runs 464 Custom Applications

According to a report published by the Cloud Security Alliance, the average enterprise has 464 custom applications deployed today.  Security for custom applications is more important than ever. It’s time to look at RASP technologies.
The post Average … Continue reading Average Enterprise Runs 464 Custom Applications

Recognizing the Risks of the Cloud

A recent article in Forbes discussed prioritizing the risks of the cloud, and specifically called out four areas of risk that need to be addressed by organizations moving to the cloud. Included were application and workload security, often overlooked b… Continue reading Recognizing the Risks of the Cloud

Six Months Left For NIST SP800-53 Compliance

Six months ago, NIST (National Institute of Standards and Technology) released a new version of their security and privacy framework, which had its last update seven years ago.  The new framework included requirements for RASP and IAST.
The post Six … Continue reading Six Months Left For NIST SP800-53 Compliance

Proving Zero Day Detection Capabilities

In today’s world of increasing zero day attacks and the increasing success of zero day attacks, the ability to detect and protect applications and workloads from zero day attacks is more important than ever. Find out about a recent test K2 ran on zero… Continue reading Proving Zero Day Detection Capabilities

280 Days to Fix a Vulnerability in Production

IBM’s 2020 report on the Cost of a Data Breach found that on average it takes 280 days to fix a vulnerability in production once a breach is discovered.  If you’ve got an application in production you may be wondering how you can protect the applicatio… Continue reading 280 Days to Fix a Vulnerability in Production

Most Security Pros Think a WAF is High Maintenance

Web Application Firewalls (WAFs) are a traditional application security tool used by many organizations in their arsenal against the cyber attacks inflicted on a continual basis on their infrastructure.  When they were introduced, they were seen as the… Continue reading Most Security Pros Think a WAF is High Maintenance

A New Book to Learn About Application Security

If you’re just starting out as an application developer or you’re a seasoned developer looking for a good review guide, there’s a new book from Wiley titled “Alice and Bob Learn Application Security” to assist with learning about the fundamentals of ap… Continue reading A New Book to Learn About Application Security

Three Application Security Fundamentals Every Developer Should Know

TechBeacon recently published an article on the Three Application Security Fundamentals Every Developer Should Know. The article bases its recommendations for developers on research that came out of a recent USENIX Security conference for developers an… Continue reading Three Application Security Fundamentals Every Developer Should Know