Securing the software supply chain is a monumental task for cybersecurity leaders. A survey from Secure Code Warrior investigated how application developers view security in their work.
How and when security measures are integrated into application development can greatly change the vulnerability level of software. Compare two cybersecurity strategies: DevSecOps and SecDevOps to see which makes more sense for your organization.
It feels like IT and security pros are tasked with the impossible job of operating business-critical applications in Infrastructure as a Service (IaaS) environments in the dark with no ability to monitor and protect them in runtime.
NTT’s AppSec Stats Flash Volume 10 show 52% of the applications in the healthcare industry have at least one serious vulnerability — rating ‘high’ or ‘critical’ on the Common Vulnerability Scoring System scale — open throughout the year.
Sukumar Reddy Saddi has been named Global Integrity Finance's Chief Technology Officer. Saddi will lead the company's end-to-end information technology strategy and development of financial applications.
According to a recent ransomware study, cybercrime rings have used fake apps related to the COVID-19 pandemic to target individuals. New research looks at the most impersonated apps, along with trends in other cyberattacks.