Application Security: The Best/Worst Is Yet to Come

In the wake of recent high-profile breaches, all eyes are on application security. Yet, application security hasn’t always received the attention during the application development process it deserves. Many organizations deploy applications with known vulnerabilities to meet their deadlines, with the idea that they’ll be addressed in the next update. That’s a dangerous gamble. DevSecOps..
Read more

Adopting a Strategic Mindset for Cloud-Native Application Protection

With more applications being developed in a cloud-native fashion, using containers and serverless architecture, organizations should think about smarter, more efficient and more reliable ways to protect their applications. Cyberattackers are more innovative and are achieving more success in compromising cloud-native applications, so vigilance is a must for developers, security professionals and IT organizations. Download..
Read more

Heading Off a Cloud Security Crisis

Application workloads deployed in the cloud, in theory at least, should be more secure than those deployed on-premises, because a cloud service provider has all the expertise required to secure those platforms. Organizations run into trouble, however, when responsibility for cloud security is shared between the cloud service provider and the IT personnel that deploy..
Read more

AWS Security Case Study: Visibility into Containers Provides Application Context

Poka is a connected worker application built specifically for manufacturers. It brings together collaboration, training, and skills management into a single integrated platform to empower factory workers to learn continuously and solve problems autonomously. Designed from the ground-up as a cloud native application, Poka lets companies build their own proprietary knowledge base to use and..
Read more

Managing the AppSec Toolstack

The best cybersecurity defense is always applied in layers—if one line of defense fails, the next should be able to thwart an attack, and so on. Now that DevOps teams are taking  more responsibility for application security by embracing DevSecOps processes, that same philosophy applies to security controls. The challenge many organizations are facing now..
Read more

From Monolithic to Modern: The Imperative for Flexible Web App and API Protection Everywhere

Seismic shifts in software development are driving the need for a new breed of flexible security solutions. Legacy web application firewalls (WAF) predate the growth of cloud-native apps and daily release cycles. Modern applications require scalable security, meaning effective defenses that operate where applications are deployed. A comprehensive web app and API protection (WAAP) platform..
Read more

Pentest as a Service Impact Report 2020

The goal of this study by Rain Capital’s Dr. Chenxi Wang is to understand the specific benefits and challenges of deploying a Pentest as a Service (PtaaS) solution in a modern software development environment, as well as to compare the SaaS model with traditional, legacy pentest services. The report also examines the impact of DevOps on the adoption..
Read more