applications
APIs: Securing the Stitching Connecting Applications
Application programming interfaces (APIs) are an essential enabler of innovation in today’s digitally driven world. Applications (or application components) can leverage APIs to connect to other apps and communicate autonomously. APIs are ...
Why CISOs Should Own Application Rationalization
Reducing overlap and mitigating potential security gaps are just two reasons why application rationalization is a sound strategy A major cybersecurity concern many organizations and executives may not be aware of but ...
Most Apps Use Vulnerable Open-Source Libraries, Veracode Research Shows
New research from Veracode found that most applications use open-source libraries that also present vulnerabilities, but the distribution of such libraries depends on the programming languages used. Open-source libraries are ubiquitous, but ...
Is Security for Containers and Microservices the Same?
From an information security point of view, protecting containerized applications or microservices can be interpreted in two ways. The post Is Security for Containers and Microservices the Same? appeared first on Radware ...
Application SLA: Knowing Is Half the Battle
Applications have come to define the digital experience. They empower organizations to create new customer-friendly services, unlock data and content and deliver it to users at the time and device they desire, ...
HTTPS: The Myth of Secure Encrypted Traffic Exposed
The S in HTTPS is supposed to mean that encrypted traffic is secure. For attackers, it just means that they have a larger attack surface from which to launch assaults on the ...
Continuous processes can complicate security, but also provide an answer
While cloud computing has promised to simplify the management of business-technology systems, it hasn’t exactly turned into a net simplification when it comes to security. Sure, cloud infrastructure platforms remove the complexity ...

