Some Good News About Application Security

Forrester IT

In my new report, “The State Of Application Security, 2020,” some of the trends are. Applications remain the most popular attack vector, open source continues to infect everything, and too many industries are not investing in the application security controls they need.

The Web Application Firewall Market Is Ripe For Disruption

Forrester IT

Let’s face it: Web Application Firewalls (WAFs) rarely excite the security imagination. age of the customer application security cybersecurity security & risk security architecture API security web application firewalls

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Spending On Application Security Tools To Grow Over 16% Annually

Forrester IT

Hackers go after web applications because they are typically the most vulnerable. In fact, web application was the top data breach type, accounting for almost one in five confirmed data breaches, according to Verizon’s 2018 Data Breach Investigations Report. Security and risk decision makers are spending more on application security and increasing deployment of application […]. application security web application firewalls

Tackle Security Concerns for Application Modernization

Perficient - Digital Transformation

In our previous post, Create Your Transformation Roadmap for Application Modernization , we offered guidance to prepare your organization for successful cloud adoption. Part 2 of this series addresses some of the security concerns you may stumble upon in your cloud journey.

Optimizing Operations for Modern Applications

Perficient - Digital Transformation

In our previous blog post in this series, Tackling Security Concerns in Application Modernization , we focused on security. In this post, we’re going to go a st ep further and examine the operations of modern applications as a whole. Security.

The Open Web Application Security Project (OWASP): An online community with a virtuous goal

CTOvision

One of our CTOvision Pro subscribers requested we provide more context on web based and mobile application security and referenced the good work underway by OWASP. The Open Web Application Security Project is a non-profit online community dedicated to web application security.

Protect SaaS Applications with Cloud-Based Security

Information Week

The massive amount of sensitive data being processed by SaaS applications requires new approaches to security, including cloud-based next generation firewalls

Making The Smart City Safe And Secure

Forrester IT

As cities grow, municipal governments are investing in infrastructure and applications to improve operations, services for constituents, and the overall urban experience. government IoT security physical security security & risk digital transformation IoT Security & Risk

Threema, the Seriously Secure Messaging Application: Check It Out!

CTOvision

If you’ve ever been worried that the messages you are sending your friends and co-workers via the normal texting applications were not secure enough and you felt unsafe giving out personal information, then Threema might be the application for you to use. By May Gourley.

Napatech: Accelerating Network Management and Security Applications

CTOvision

Napatech is the world leader in accelerating network management and security applications. They focus on keeping their customers one step ahead of the data growth curve by accelerating applications and time-to-market while reducing risk. Napatech customers cover a broad range of industries and applications including some of the largest and most innovative technology companies.

Security Innovation Network SINET 16 Application Process Now Open

CTOvision

We have previously written about the Security Innovation Network ( SINET ) and the yearly SINET Showcase. Established security firms should track SINET to learn of emerging capabilities to partner with. By Bob Gourley.

Decade Retrospective: Cybersecurity From 2010 To 2019

Forrester IT

age of the customer application security cloud security cybersecurity data security endpoint security IoT security network security security & risk security architecture zero trust security framework (ZTX) Security & Risk

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

GitLab: A single application for the entire DevOps lifecycle

CTOvision

GitLab is a single application for the entire software development lifecycle. From project planning and source code management to CI/CD, monitoring, and security. For an overview see: And for more see: gitlab.com. Infrastructure Companies

Devops 237

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. This means leveraging automation tools such as configuration management and application release automation, as well as applying Zero Trust principles all the way down to the bare metal. Information Security.

[Guide] Unlock Your Potential with Application Modernization

Perficient - Digital Transformation

Application modernization is one aspect of cloud adoption and includes: Cloud-native development. Replacement with software-as-a-service (SaaS) applications. Application integration. Application Modernization: One Path to Cloud Adoption. Tackle security concerns.

Infosecurity Europe 2019: Incremental Evolution Rather Than Revolution

Forrester IT

I have spent the last three days attending Infosecurity Europe 2019, the largest security trade show in the UK and Europe. As ever, before coming I have tried to predict the big theme or trends that CISOs should take note of.

Mobile Application Security in 2016

Galido

And how do you feel about the security of the apps you install? Arxan recently did a 5th annual State of Application Security report, which takes an in-depth look into the security of some of the most popular mobile health and mobile finance applications available.

Tips for Getting Started with Application Modernization

Perficient - Digital Transformation

Our previous post, Tackle Security Concerns for Application Modernization , addressed common security concerns and revealed a shift in this perspective. The final post in this series offers tips to secure buy in and make sure the change sticks.

Benefits of Application Modernization: Get Insights from Data

Perficient - Digital Transformation

When working with clients on cloud engagements, they continue to see significant benefits of application modernization. Part one of this series explores how application modernization pays off to gain insights from your data. How to securely access it.

Open Web Application Security Project Releases CISO Survey Report

CTOvision

By Bob Gourley The Open Web Application Security Project (OWASP) has just releases the results of a Survey of global CISO s. Their report provides helpful perspectives for two interrelated communities: 1) CISOs who will find the report provides context that can help them better manage application security risks, and 2) Developers, who will find this report underscores the importance of application security. CTO Cyber Security

Survey 228

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets.

The Security And Privacy Implications Of Drones

Forrester IT

Over the past few years, drones have transitioned from military-only applications into a strategic asset that is transforming a range of industries such as construction, real estate, insurance, and agriculture.

Open source security report finds library-induced flaws in 70% of applications

Tech Republic Security

Problems are everywhere, but most fixes are easy to find and implement, according to a Veracode report that analyzed

ServiceNow Offers A Refreshing Take On Customer-Centricity With Their Customer Service Application

Forrester IT

It’s a well attended conference by 18,000 people who use one or more of their cloud service management, HR, security and customer service products which are all built on an enterprise-grade platform. CRM applications customer relationship management (CRM) customer service solutions CRM customer service CXI attended ServiceNow’s Knowledge18 conference, held in Las Vegas on May 7-10.

Security Think Tank: Secure your web applications without prejudice

Computer Weekly

What are the main web security challenges for organisations and how are they best addressed

The F5 Acquisition Of Shape Security: An Insider’s View

Forrester IT

David Holmes formerly worked for both F5 Networks and Shape Security. age of the customer security & risk security architecture

7 principles of modern web application development

mrc's Cup of Joe Blog

Summary: Driven in part by recent trends, web application development has changed over the past few years. In this article, we explore the principles that modern web developers must follow when building successful applications. Does the application meet the specs? Is it secure?

As Bad Bots Evolve, Bot Management Solutions Evolve To Fight Them

Forrester IT

One of my favorite things about covering the bot management market is that bots are not just a security issue. age of the customer application security security & risk bot management bots Security & Risk

Improving the Performance and Security of Mission Applications with Enhanced Networking

CTOvision

Applications supporting national security missions must work and they must work fast. While this commoditization has led to countless new analytic capabilities, it has also shifted the focus away from the hardware components and onto the software stack which has, in turn, created inefficiencies in both the overall performance and security of deployed systems. Big Data Cloud Computing CTO Cyber Security EventsBob Gourley.

5 Best Security Practices When Building Applications

IT Toolbox

An insecure business environment presents a potential data breach that can be exploited by hackers to bring your business down without warning

Artificial Intelligence Applications and Succeeding with IAIDL

Galido

Information Technology Blog - - Artificial Intelligence Applications and Succeeding with IAIDL - Information Technology Blog. The following are applications for artificial intelligence. Front- and middle-office AI applications offer the greatest cost savings opportunity across banks.

Solarflare’s Application Nanosecond TCP Send

CTOvision

Certain classes of network application fall into the category of high-performance request-response applications. These applications require either very low latency (<< 1μs) between receipt of request and transmission of response, the ability to handle a very large number of such transactions (>>100ktps), or both. Cyber Security networksMarty Meehan.

7 web application development challenges you can’t ignore

mrc's Cup of Joe Blog

Summary: As technology evolves at breakneck speed, it brings new opportunities and challenges to web application development. If businesses want to create lasting, successful web applications, they must address these challenges. Let’s talk about web applications.

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80 percent of […]. Cyber Security News

Mobile 206

More on OnLive: New Cloud Solution Delivers Secure Cross-Platform Deployment for Graphics Intensive Applications

CTOvision

NEW ONLIVE CLOUD SOLUTION DELIVERS SECURE CROSS-PLATFORM DEPLOYMENT FOR GRAPHICS INTENSIVE APPLICATIONS. OnLive CloudLift Enterprise PaaS provides the first seamless solution for businesses with Graphics Intensive Applications. By Bob Gourley.

Nonpublic 5G Networks Will Be A Critical Building Block Of Your Enterprise Network Strategy

Forrester IT

Nonpublic 5G networks promise better privacy, data security, compliance, and cellular network performance; they also offer safer and more private features for dedicated user groups.

Are Your New Remote Workers Visible to Security Operations?

CEB IT

While this move creates obvious challenges for IT in terms of infrastructure and capacity, it’s also creating challenges for security teams as they push to scale remote work on a rapid and global level. Lack of visibility does not equate to a lack of security vulnerabilities.

Leverage Bot Management To Enforce Ethical Data Use

Forrester IT

application security data mining and collection privacy security & risk Security & Risk

Data 243

FORRward: A Weekly Read For Tech And Marketing Execs

Forrester IT

Age of the Customer application development & delivery B2B marketing B2C marketing CIO insights CMO Trends customer experience digital business infrastructure & operations security risk management

Google 235

FORRward: A Weekly Read For Tech And Marketing Execs

Forrester IT

Zoom Forfeits Goodwill By Failing To Secure What It Sells COVID-19 has crippled many companies, but one that surged, at least at first, was Zoom Video Communications, Inc.

B2B 265

Microsegmentation – Secure Your Internal Network

CTOvision

Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic. Today, most opens systems, servers, routers, and switches ship with all the security controls open. Illumio Adaptive Security Platform.