75% of Leaders Lack Confidence in Their Web Application Security

75% of Leaders Lack Confidence in Their Web Application Security

Cymatic  released new survey results from C-suite and VP-level executives in IT and cybersecurity detailing the state of web application security. The survey included some troubling results, including the finding that 75 percent of IT leaders lacked confidence in their web application security.  The post 75% of Leaders Lack Confidence ... Read More
Enhancing Tenable.io Web Application Scanner Results

Enhancing Tenable.io Web Application Scanner Results

Tenable.io is one of K2's technology partners, and K2's vulnerability detection can enhance the testing results generated by a Tenable.io WAS test.  K2's Security Platform is a complementary addition to Tenable.io WAS that offers 3 significant benefits to a standalone Tenable.io WAS scan. The post Enhancing Tenable.io Web Application Scanner ... Read More
The Need for Deterministic Security

Over 40% of Applications Actively Leaking Data

Security magazine recently reported on  WhiteHat Security's AppSec Stats Flash Volume 3, the latest installment of the company’s monthly report and podcast reflecting on the current state of application security and the wider cyber threat landscape.  One of the key findings was that over 40% of applications are actively leaking information ... Read More
The Need for Deterministic Security

One-Third of Organizations Take No Action After Detecting a Cyber Attack

ZDNet recently wrote about some new statistics from the annual Cyber Security Breaches Survey from the Department for Digital, Culture, Media and Sport (DCMS), including the surprising statistic that 1/3 of organizations take no action after a cyber attack. The post One-Third of Organizations Take No Action After Detecting a ... Read More
The Need for Deterministic Security

Average Enterprise Runs 464 Custom Applications

According to a report published by the Cloud Security Alliance, the average enterprise has 464 custom applications deployed today.  Security for custom applications is more important than ever. It's time to look at RASP technologies. The post Average Enterprise Runs 464 Custom Applications appeared first on K2io ... Read More
The Need for Deterministic Security

Recognizing the Risks of the Cloud

A recent article in Forbes discussed prioritizing the risks of the cloud, and specifically called out four areas of risk that need to be addressed by organizations moving to the cloud. Included were application and workload security, often overlooked by organizations. The post Recognizing the Risks of the Cloud appeared ... Read More
The Need for Deterministic Security

Six Months Left For NIST SP800-53 Compliance

Six months ago, NIST (National Institute of Standards and Technology) released a new version of their security and privacy framework, which had its last update seven years ago.  The new framework included requirements for RASP and IAST. The post Six Months Left For NIST SP800-53 Compliance appeared first on K2io ... Read More
The Need for Deterministic Security

Proving Zero Day Detection Capabilities

In today's world of increasing zero day attacks and the increasing success of zero day attacks, the ability to detect and protect applications and workloads from zero day attacks is more important than ever. Find out about a recent test K2 ran on zero day detection. The post Proving Zero ... Read More
The Need for Deterministic Security

Over 70% of Organizations Say Applications More Vulnerable

A recent Ponemon Institute report on application security found that 71% of large enterprise-scale organizations felt their applications have become more vulnerable. Respondents to the survey indicated they are struggling more with monitoring, detecting and preventing attacks.  The post Over 70% of Organizations Say Applications More Vulnerable appeared first on ... Read More
The Need for Deterministic Security

Who Owns Security?

When we think about security in the framework of our applications, you may be wondering whose responsibility is it ultimately to ensure the application is secure, is it the developer, security or is it operations?  A 2020 survey done by Gitlab may have surprising results to that question.  The post ... Read More