Defining a plan to improve developer security maturity is no easy task when you still have compliance requirements and release deadlines to meet. But it is a worthy one that will pay dividends in improved productivity and reduced risk. In this guide, we explore the lessons learned from three real-life Secure Code...
A music streaming blockchain service patched a bug on a smart contract that had gone undetected since 2020. An attacker used it to steal $AUDIO crypto tokens worth nearly $6 million and sold them for more than $1 million. The vulnerability wasn't detected by multiple smart contracts security audits.
Nascent startups have ditched the "growth at all costs" mantra of 2021 to hold onto enough cash to weather the macroeconomic storm expected later this year. Gone are the days of security vendors promising to double annual sales while burning cash even faster than they bring in new business.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.
The U.S. Department of Justice unsealed its first insider trading case involving cryptocurrency markets, marking an escalation of traditional oversight. The case comes as a federal jury convicted a New York man for defrauding investors who bought into his supposed cryptocurrency.
You know it and we know it: DevOps is increasingly moving to the cloud. If you want a clear view of your security posture, you need a state of the art software security platform that’s cloud-native to support where DevOps lives.
Join our panel of experts, and we’ll show you the secret to better, more-relevant...
Halborn raised $90 million to expand its audit and penetration testing services and more effectively safeguard the crypto industry. The proceeds will bolster its protection for cryptocurrency lending protocols and better defend the money flowing into and out of the cryptocurrency ecosystem.
Premint NFT platform users became victims last weejend of one of the biggest NFT attacks ever. The company says an open-source vulnerability led to the compromise of its website, resulting in its users losing about $500,000 worth of blockchain assets.
Serverless computing is the next step in the two-decade-long process of removing friction from the software development life cycle (SDLC) to improve the speed, scalability, and cost-efficiency of software development. However, the way it is architected brings new security complexities that legacy application security...
Forrester predicts that 25% of developers will be using serverless technologies by next year. However, most application security approaches are inadequate in their coverage for serverless applications and unable to scale to support the speed and accuracy demanded by them.
Download this white paper to learn:
The evidence is in the news: Threat actors are taking constant advantage of weakly secured applications. Dan Shugrue of Digital.ai discusses how to secure applications from the start by creating a new blueprint for developing secure software.
The company ePlus has purchased Future Com to strengthen its security operations strategy and support of managed services. The deal will allow ePlus to help customers evolve their security operations teams from correlating and analyzing logs to delivering advanced capabilities like threat hunting.
A new assessment framework aims to help patients, healthcare providers and others examine the various privacy, security and other risks of digital health technologies, says Tim Andrews of the nonprofit Organization for the Review of Care and Health Applications, which co-developed the framework.
Get practical tips & best practices for bringing development and security teams together for DevSecOps.
DevSecOps, when done correctly, can transform how quickly businesses can develop and deploy applications securely. Yet many organizations struggle to put it into practice.
Download this guide for practical...
The identity verification challenge for enterprises has become significantly more complicated due to mass digital transformation.
But behavioral analytics and anomaly detection, working together, can reduce both fraud and the friction that can come with traditional authentication methods.
Download this eBook in...