We believe that data is the phenomenon of our time. It is the world’s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true—even inevitable—then cyber crime, by definit...
Application security people, like anyone else, can make mistakes. Hasty actions and bad assumptions lead to a less complete discovery of flaws — or to outright disaster. In the worst case, A clumsy attempt to discover security problems can itself cause a brea...
Returning from Saturday’s LechazoConf 2017, a conference about failures (and successes) of entrepreneurs/startups in Castilla-Leon (and Spain). I enjoyed the conference! Organization was awesome, content was nice, and the lechazo was great (I am from Traspine...
The conversation surrounding application security could go a thousand different directions, technology is a massive landscape after all. For the purposes of this discourse, our focus will be on three particular arms of appsec. Perhaps we could call them the G...
The GDPR is Promoting a Culture Change About Data Privacy The importance and need for security has never been greater, in particular with personal and data security. Among all the great benefits of technology, the internet and the resulting connecti...
The concept of open source software has shifted considerably from what some enterprises once thought about it. Any negative thoughts then were all misconceptions or not understanding what open source really is. Considering open source software is often free o...
The National Institute of Standards and Technology (NIST) is a non-regulatory agency of the U.S. Department of Commerce that, among other things, maintains physical science laboratories and produces guidance for assessing compliance with a wide range of stand...
Open-source licensing isn’t as complicated as license agreements go. Some people find it confusing, and businesses must pay close attention to how the licenses work. Making a mistake in one direction can result in legal action. Erring in the other direction c...
Adding security to DevOps processes will empower developers with state-of-the-art insights and analysis HOUSTON – Oct. 5, 2018 – Idera, Inc., parent company of global B2B software productivity brands, today announced the acquisition of&nbs...
Cybersecurity often seems like an expensive proposition to many companies. There are annual evaluations to make sure you’re maintaining compliance, expensive programs to put in place, and extensive measures that have to be taken in order to provide true prote...
With the coming of GDPR, the stakes in application security get still higher. There are plenty of reasons for concern already; theft of confidential data can lead to liability, serious financial losses, and damage to reputation. GDPR adds fines as high as 10 ...
Almost every developer relies to some degree on open source software, and it’s tough to beat the flexibility of open use and distribution licensing. However, it’s also critical that all developers understand how to control open source components. Th...
App and software breaches can have lasting consequences. They also aren’t going anywhere. Finding vulnerabilities in your app and code early is critical. Maintaining strong security practices during and after development is essential to protecting your business.