When software is everywhere, everything becomes an attack surface.
The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, “Can the industry do a better job of writing more-secure code, making software applications nearly...
Gartner predicts that more than 75% of global organizations will be running containerized applications in production, and it’s no wonder, because containers revolutionize app development, from speed of delivery to scalability.
Learn how containers help organizations save resources and quickly get software to...
The latest edition of the ISMG Security Report features an analysis of ransomware gang REvil’s threat to release stolen Apple device blueprints unless it receives a massive payoff. Also featured: discussions of the importance of a “shift left” strategy and efforts to secure cryptocurrencies.
A recent study conducted by Aite group found that 97% of financial apps have no protections against decompiling and viewing source code. In fact, of the 4+ million apps in Google’s Play Store and Apple’s App Store, the majority are not sufficiently protected to stop even the most basic reverse engineering attack....
A recent study conducted by Aite group found that 97% of financial apps have no protections against decompiling and viewing source code. In fact, of the 4+ million apps in Google’s Play Store and Apple’s App Store, the majority are not sufficiently protected to stop even the most basic reverse engineering attack....
During a decade that has redefined people’s expectations for software, this ongoing survey of more than 35,000 technical professionals around the world has deepened understanding of the practices that let some organizations streak ahead, while others are left in the dust.
The 2020 State of DevOps Report focuses...
Enterprise DevOps adoption has been on the rise as organizations adapt to agile development trends and increasing digitization demands. Puppet and Computing Research surveyed approximately 150 technical decision makers at enterprise organizations across many verticals. This survey found only 36% of the companies had...
This ebook focusing on change management draws from Puppet's 2020 State of DevOps Report to explore how organizations can improve, modernize, and automate change management. This ebook provides actionable ways to implement DevOps principles to improve change management in order to increase speed and agility and...
With more and more companies moving to DevOps, that statistic is likely to grow due to the increased demand for more applications faster meaning more chance for error. The good news is that these application vulnerabilities are extremely preventable through on-demand focused interactive lessons to learn how to code...
An attacker added a backdoor to the source code for PHP, an open-source, server-side scripting language used by more than 75% of the world's websites. Core PHP project members say the backdoor was quickly removed.
Like virtually all enterprises in 2020, Akamai had to pivot thousands of employees to remote
work in a matter of days. All while supporting a massive surge in platform traffic. And while
criminals sought to exploit any vulnerability these upheavals might expose.
This new report
shows you how our own products...
Dr. Chenxi Wang, industry thought leader and analyst, examined the Return on Investment that organizations may realize by using Cobalt’s Pen Testing as a Service (PTaaS) platform. This study took a detailed look at the benefits and costs of deploying Cobalt’s services in comparison with using traditional...
When software is everywhere, everything becomes an attack surface.
The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, “Can the industry do a better job of writing more-secure code, making software applications nearly...
DevSecOps is in its “awkward teenage years,” says Matthew Rose of Checkmarx. But with new tooling and automation - particularly application security testing tools - he sees the practice maturing quickly and delivering improved outcomes.
In an interview with Information Security Media Group’s Tom Field, Rose...
He started his cybersecurity career as a pen tester. As a result, Gong CISO Jack Leidecker retains an affinity for the tech community and emerging tools. He shares insight on this passion and his drive to ensure security’s role in business enablement.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.