In the latest weekly update, ISMG editors discuss how organizations can comply with the new PCI DSS 4.0 requirements, whether other countries should follow the U.S. lead on legislating software bills of materials, and key strategies for CISOs preparing for an economic downturn.
Over his 23-year career in cybersecurity, Tom Kellermann has focused on policy, endpoints and even strategic investments. Now, in his new role as senior vice president of cyber strategy at Contrast Security, his mission is to protect code security - particularly in the public and financial sectors.
The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.
How do you assess the security of your own supply chain and provide assurances downstream? Knowing how to generate and leverage a software bill of materials (SBOM) is essential. In this webinar, you will learn how to satisfy regulatory and buyer requirements and build confidence and security into your software supply...
Too often when software developers change jobs, they take source code they've written with them, feeling the code belongs to them even if it belongs to an employer. Code42's Joe Payne shares the challenges of detecting source code theft and ways to protect intellectual property wherever it resides.
There are many factors to consider when choosing a SAST tool. DevSecOps has transformed the code security from a siloed, IT centric task to the continuous responsibility of development teams. As security becomes a central concern for developers, security professionals, and operations teams, the process for selecting a...
Static application security testing (SAST) plays a major role in securing the software development lifecycle. It can address issues at the earliest stages of development so that you can address them before they become problematic.
Download this cheat sheet to learn some best practices when implementing a...
While DevSecOps comes with measurable benefits, it also comes with a cost for developers.
Aside from pulling them further from critical core tasks, we’re also asking them to be experts in areas that they may have no training.
Download this white paper to learn current solutions to that problem including:
Palo Alto Networks has been in a 19-month dry spell when it comes to major acquisitions, but it looks like that's about to change. Israeli business publication Calcalist reported Monday the firm is closing in on a deal to buy New York-based code risk platform provider Apiiro for around $600 million.
Nearly half of all breaches in 2019 involved web applications, according to the Verizon Data Breach and Investigations report.
How can a web application firewall (WAF) help? What does a web application firewall really do? What can it protect against?
The WAF for Dummies eBook can answer these and other...
In this episode of "Cybersecurity Unplugged," U.S. Air Force Chief Software Officer Nicolas M. Chaillan, a former DHS and DOD adviser, shares his opinions about the government's handling of DevSecOps and cybersecurity, where progress is being made and where more work needs to be done.
Cloudflare has crashed the party for top-performing web application and API protection vendors, joining longtime leaders Akamai and Imperva atop the latest Gartner Magic Quadrant. Gartner observed more separation between the leaders in this market and the rest of the pack.
Bitwarden has raised $100 million to expand into new product areas including developer secrets, passwordless and privileged access management. The investment will help the firm debut new features for individual and business users and expand its footprint in Japan, Germany, France and South America.
In today’s connected world, securing web applications and APIs from a wide range of threats — from web app business logic attacks and API abuse to bots — is critical for business success. However, securing digital properties amid cloud journeys, modern DevOps practices, and constantly changing applications and...
In today's dynamic threat environment, security teams must adopt a risk-based approach, prioritizing the most important areas of their organization. They also should not be afraid to seek outside help. Murtaza Hafizji of Bugcrowd discusses the merits of crowdsourced security.