Collaboration is key to a secure web application architecture

TechTarget recently ran an interview with “Web Application Security” author Andrew Hoffman, who explained the importance of a secure web application architecture and how to achieve it through collaboration between software and security engineers.
The p… Continue reading Collaboration is key to a secure web application architecture

IT Pros Prefer Best of Breed Security vs. Single Vendor Solutions

A recent Ponemon study found that 71% of IT professionals prefer to use best-of-breed security solutions rather than get all of their security tools from a single vendor.  This finding is especially important in the light of recent security architectur… Continue reading IT Pros Prefer Best of Breed Security vs. Single Vendor Solutions

Announcing General Availability of Cequence API Sentinel 2.0

Today we are happy to announce the general availability of version 2.0 of Cequence API Sentinel. This release brings to market several exciting new capabilities requested by our customers, enabling Cequence to continuously discover, monitor and protect… Continue reading Announcing General Availability of Cequence API Sentinel 2.0

60% of Organizations had an OWASP Top 10 Attack in the Last Year

An ESG report on Modern Applicaton Development Security released in August of 2020 found that 60 percent of organizations had experienced an attack on an OWASP Top 10 vulnerability in the prior 12 months.
The post 60% of Organizations had an OWASP Top … Continue reading 60% of Organizations had an OWASP Top 10 Attack in the Last Year

3 Steps to Shielding Right While Shifting Left for API Protection

Most organizations have seen exponential growth in API usage in the last few years, driven by a rapid increase in mobile applications, containers, serverless computing, microservices architectures, and cloud adoption. However, APIs are a double-edged s… Continue reading 3 Steps to Shielding Right While Shifting Left for API Protection

3 Steps to Shielding Right While Shifting Left for API Protection

Most organizations have seen exponential growth in API usage in the last few years, driven by a rapid increase in mobile applications, containers, serverless computing, microservices architectures, and cloud adoption. However, APIs are a double-edged s… Continue reading 3 Steps to Shielding Right While Shifting Left for API Protection

Cyber Attacks On The Rise For Businesses

A new report, the Hiscox Cyber Readiness Report 2021, surveyed over 6,000 companies in the U.S. and Europe and found that the number of businesses targeted by cyber criminals in the past year increased from 38% to 43%, with over a quarter of those targ… Continue reading Cyber Attacks On The Rise For Businesses

84% of Codebases Contain Open Source Vulnerabilities

A new report from Synopsys examined audit data from 1,500 + commercial codebases to examine how organizations are using open source code.  The past year with the COVID pandemic saw a significant increase from last year’s report, with the number of open… Continue reading 84% of Codebases Contain Open Source Vulnerabilities

75% of Leaders Lack Confidence in Their Web Application Security

Cymatic  released new survey results from C-suite and VP-level executives in IT and cybersecurity detailing the state of web application security. The survey included some troubling results, including the finding that 75 percent of IT leaders lacked co… Continue reading 75% of Leaders Lack Confidence in Their Web Application Security

Over 40% of Applications Actively Leaking Data

Security magazine recently reported on  WhiteHat Security’s AppSec Stats Flash Volume 3, the latest installment of the company’s monthly report and podcast reflecting on the current state of application security and the wider cyber threat landscape.  O… Continue reading Over 40% of Applications Actively Leaking Data