The Need for Deterministic Security

Traditional Application Security Tools Ineffective Against New And Growing Threats

A new article in Help Net Security covers some interesting new statistics that reflect the inability of current security tools to protect organizations against attacks happening on web applications.  The article shares ...
The Need for Deterministic Security

Why WAFs Don’t Work According to a Hacker

A new article in SDXcentral talks about why WAFs (Web Application Firewalls) are insufficient protection according to a hacker.  The topic of WAFs isn't new to K2 and we've covered their failures ...
The Need for Deterministic Security

Why Do Developers Continue to Write Vulnerable Code?

It's been 18 years since OWASP first published their list of Top 10 Web Application Security Risks in 2003. It wouldn't be unreasonable to think it would have been possible to solve ...
The Need for Deterministic Security

Application Security Books For Your Bookshelf

Security practitioners are under the constant need to keep up to date and continue their learning, just to keep up with the ever changing tactics of cyber criminals.  It's one of the ...
Experience-First Networking with CEO Rami Rahim | Juniper Global Summit

Juniper and K2 Expand Partnership for Cloud Workload Protection

Organizations have seen a dramatic shift towards digital transformation in recent years, driven in part by the COVID-19 pandemic and the work from home phenomenon.  Part of that transformation included a shift ...
The Need for Deterministic Security

Too Many Vulnerability Reports? Not Enough Real Vulnerabilities?

One of the most common issues with security testing of applications is being inundated with vulnerability reports, containing too many vulnerabilities for a typical development team to handle.  This includes reports from ...
The Need for Deterministic Security

Every Company is Now a Software Company

A recent article in Reportdoor.com started with these words, "Every Company is Now a Software Company."  With COVID still causing disruption for every organization, this has truly become a truth for every ...
Logging 1

Logging: A Deep Dive

Our RASP product At Imperva our team builds a product called RASP which stands for Runtime Application Self Protection. As indicated by the name, it is a security product which plugs directly ...
The Need for Deterministic Security

75% of Companies Spend as Much Time on False Positives as on Real Security Events

A new ESG report found that nearly half of all cybersecurity alerts are false positives, and 75% of companies spend an equal amount of time, or more, on them than on actual ...
The Need for Deterministic Security

Major Insurance Companies in Europe Discover That Their Applications Have Security Issues

A new article in TechTimes is highlighting the results of a study on the web application security for Insurers in Europe.  The study found that the web applications of major insurance companies ...