How Low-Code/No-Code App Development Affects IT Security

While low-code and no-code application development is a couple decades old, the train truly left the station just a few years ago. It has been gaining considerable steam ever since. So popular ...

The Evolution of Application Development

| | application development
pplication development has gone through an array of stages. Challenges relating to it got so taxing that in 2001 several noted developers got together to establish the Agile Manifesto. Its goal was ...
Cloudflare Akamai software, engineering, OWASP, organizations, appsec, AppSec Salt Security API security rise GitOps Finite State API APIs tokenization

Low-Code/No-Code App Dev’s Inherent Security Risks

Many organizations now rely on low-code/no-code app development platforms to cost-efficiently address a variety of application needs in different aspects of business operations. A recent survey revealed that 47% of organizations are ...
Security Boulevard

Common Goals are Essential for Successful DevSecOps

At the heart of having a successful vulnerability management program is alignment between development, security, and operations teams (dubbed DevSecOps) in being able to achieve both innovation and security when delivering products—the ...
Twenty Years of MMORPG Hacking: Better Graphics, Same Exploits

Fundamental Security Concepts and Best Practices Every Game Developer Should Know

Gaming is now the world’s favorite form of entertainment, with Newzoo reporting that by 2023 there will be more than three billion gamers across the planet. With the growth of multiplayer games, ...

Forrester Report Reveals the 5 Benefits IT Teams Really Need from API Security Tools

An Application Programming Interface (API) is a software intermediary that allows applications to communicate with one another. APIs provide routines, protocols, and tools for developers to facilitate and accelerate the creation of ...
Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud

Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud

By Arun Balakrishnan, Sr. Director Product ManagementPhoto by Markus Spiske on UnsplashIdentity credentials and source code are critical assets that can create major risks for your organization when exposed by breaches of third-party ...
Secure Software Summit: The State of OSS Supply Chain Security

Secure Software Summit: The State of OSS Supply Chain Security

By Dan Lorenc, ChainguardThis article is part of a series showcasing learnings from the Secure Software SummitPhoto by Reproductive Health Supplies Coalition on UnsplashThe Open Source Software (OSS) Supply Chain is under attack. As ...
The Complete Guide to Securing Your Software Development Lifecycle

The Complete Guide to Securing Your Software Development Lifecycle

How to improve the security of your application with strong DevSecOpsPhoto by 愚木混株 cdd20 on UnsplashThe unfortunate reality is this: application security is in an abysmal state. Industry research reveals that 80% of ...
Key Considerations When Choosing a SAST

Key Considerations When Choosing a SAST

We take a look at 11 key criteria when choosing a static analysis tool for modern codePhoto by Caleb Jones on UnsplashFor companies writing and maintaining software at scale today, SAST (Static Application Security ...