The U.K. government on Friday released voluntary code of practice that will be monitored for compliance. The guidelines tell operators and developers to ensure that apps receive updates to fix security vulnerabilities and call for every app developer to establish a vulnerability disclosure process.
Approov has landed a new CEO to help the mobile security upstart expand in the United States and capture more healthcare and financial services customers. The Silicon Valley-based company has captured high-profile European customers such as BMW from its development center in Scotland.
Akamai's acquisition of Guardicore allowed the company to extend from protecting public-facing web content and APIs to safeguarding internal applications and data, says CEO Tom Leighton. The $600 million deal will allow the Boston-area firm to blend its public-facing and internal security assets.
Serverless architecture promises no infrastructure overhead, pay-as-you-go pricing, automated scale, and quick development and deployment. The implication is that less operational overhead translates to less complexity, less risk, and less worry. But serverless applications and environments are far from flawless,...
As the threat landscape changes, the need for tighter security is ever-increasing: cyberattacks and data breaches are on
the rise and these events can do significant damage to your organization. This is where governance best practices and application risk management come in.
Download this eBook to gain more...
Software has increasingly relied on components developed by third parties or from open-source libraries, which Aqua Security CEO Dror Davidoff says injects additional risk. On-premises environments are still managed in more traditional ways, with the development and production phases totally siloed.
Organizations should build apps and design development workflows in a way that embraces how quickly cloud-native architectures change, says Snyk Solutions Engineer Iain Rose. Unlike traditional on-premises environments, containerized applications are designed to be ephemeral, Rose says.
The SolarWinds attack in December 2020 put software supply chain security on the radar of many organizations, and new threats have been rapidly multiplying ever since. But surveys show that 71% of security professionals have misconceptions about what effective software supply chain security entails and have yet to...
The need for AWS security has increased as S3 buckets have evolved from a dumping ground for data to the home for critical cloud-native applications, says Clumio co-founder and CEO Poojan Kumar. Information in S3 buckets is susceptible to both accidental deletions and cyberattacks.
The push to migrate applications to cloud-native architectures has driven increased use of containers and created the need for more security, says Veracode CEO Sam King. Veracode's expertise in application security helps the company identify open-source code and known vulnerabilities in containers.
There was one major problem when Equifax had to change its entire approach to transforming their IT environment — the management of open source libraries needed to be more advanced.
Learn how Sonatype's full-spectrum software supply chain automation with the Nexus Platform brought a holistic approach to managing...
According to Gartner, “By 2025, 75% of application development teams will implement SCA tools in their workflow, up from 40% today, in order to minimize the security and licensing risks associated with open-source software.”
From this report, gain insight on how to ensure minimal disruption to your development...
Sonatype’s eighth annual State of the Software Supply Chain Report blends a broad set of public and proprietary data and analysis, including dependency update patterns for more than 131 billion Maven Central downloads and thousands of open source projects, survey results from 662 engineering professionals, and the...
This edition of the ISMG Security Report discusses how Australian health insurer Medibank is facing stark consequences for not paying a ransom to a group of cyber extortionists, how to limit unnecessary cybersecurity exposure during M&A, and how to manage challenges in hybrid environments.
Discover the top ten mistakes to avoid when implementing a secure software supply chain solution. Based on real user experiences with Sonatype Nexus Lifecycle, this approach delivers benefits that include reduced security and licensing risks, as well as improved time-to-market for new applications, resulting in...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.