Application Security
AppSec Decoded: The consequences of insecure IoT devices
Watch the latest video in our AppSec Decoded series to learn why manufacturers should consider building security into their IoT devices. The post AppSec Decoded: The consequences of insecure IoT devices appeared ...
20/20 hindsight shows that foresight wasn’t 20/20
In a year marked by unprecedented challenges, we revisit the 2020 cyber security predictions to see which projections held up and which ones didn’t. The post 20/20 hindsight shows that foresight wasn’t ...
New Study Says Cyber Security Technology Isn’t as Effective As It Should Be
A new study by Debate Security finds that the efficacy problems in cyber security are more related to economic issues rather than technology issues. It found that companies when evaluating which cyber ...
Five App Security Predictions for 2021: BOPIS, Flash Sales, Discord, GraphQL and DevSecOps
Get the 5 predictions for app security 2021. To protect your e-commerce business, the trends to watch are BOPIS, Flash Sales, Discord, GraphQL and DevSecOps ...
Who’s your fridge talking to at night?
By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity that creates something new. These strange times have resulted in something new ...
Holidays Are Coming – the State of Security for E-commerce in 2020
With the Coronavirus pandemic driving consumers online, a new report from Imperva reveals how this year’s holiday shopping season will present online retailers with a level of traffic – and cyber-attack threats ...
Container Workloads on AWS, Azure, and Google Cloud Platforms
Docker, an open-source project to automate deployment of applications as portable self-sufficient containers, has propelled an entire set of container technologies and a totally new way to design systems. As microservices architectures ...
Why Do Zero Day Security Technologies Fail to Protect Against Zero Day Attacks?
Today's security technologies fail to detect true zero day attacks, K2 has a video that explains why these security technologies fail to protect against zero day attacks and the need for deterministic ...
Top 10 Web Application Vulnerabilities and How to Mitigate Them
The inability to identify vulnerabilities in a web application can leave it unprotected against potential attackers, resulting in the mostContinue reading The post Top 10 Web Application Vulnerabilities and How to Mitigate ...
Can your security keep pace in a DevOps environment?
There’s a growing need for both security and speed in application development. DevSecOps introduces security earlier in the SDLC to ensure secure code. The post Can your security keep pace in a ...

