The future of AppSec: Stop fighting the last war

Source – helpnetsecurity.com It’s a cornerstone of military doctrine: when you focus too much on the last battle you faced, you miss signs of the new battleground taking shape. The principle holds as true for cybersecurity as it does for cavalries and tanks. The surest way to put your organization at risk is to keep your defense strategy rooted in the past – especially it wasn’t all that effective in the first place. If tactics like slow gatekeeping controls haven’t been

Read more

The top three approaches for improving cloud migration and security

Source – cloudcomputing-news.net For many enterprises, migrating towards a cloud delivered approach for IT systems is an attractive proposition. Cost efficiency and business agility are big drivers for CIOs to make the move.  Most modern companies have either started migrating toward a public cloud or they are in the early planning and analysis phases of doing so. At the same time, making the jump from on-site infrastructure to cloud-hosted platforms is not free of challenges such as, regulations, data governance, billing

Read more

Are DevOps and Application Security Compatible?

Source – simpleprogrammer.com DevOps is the word of the year. The software industry is on fire with the DevOps craze and more and more companies are looking for DevOps skills. DevOps practices are the key to delivering value quickly, scaling effectively, and enabling a fast feedback cycle of important information. They allow the true agility in software development that companies need to be successful. Good application security practices help to prevent the misuse of software for nefarious means. It aims to protect

Read more

DevOps requires automation and testing to ensure application security

Source – techproresearch.com DevOps is known for continuous delivery and rapid iteration – almost the exact opposite of enterprise security, which can be seen as slow-moving and overly cautious. As more companies move toward DevOps as a means of delivering and maintaining applications, security becomes critical to plug gaps and prevent data breaches–especially in the continuous delivery pipeline, which can introduce more holes for hackers to wriggle into. Experts advise carefully designing the delivery pipeline and testing everything as thoroughly as

Read more

Application Security Report Calls Out Problems in Mobile, IoT Devices and DevOps

Source – securityintelligence.com Vulnerabilities in mobile backends, web interfaces to the Internet of Things (IoT) and negligent DevOps practitioners are among the fastest growing application security threats, according to a report released at the InfoSecurity Europe conference in London this week. What’s the Problem? Research from High-Tech Bridge, a Swiss company that also operates in the U.S., said 83 percent of web service and application programming interfaces (APIs) used in apps for retail, banking and other markets could fall prey to

Read more

Before You Outsource Code Development – Think About the Security Implications

Source – veracode.com Police in the Netherlands recently contacted more than 20,000 people who they suspect had their personal data stolen by a malicious web developer. This developer had built “backdoors” into applications he created for various businesses as a contractor. With the information he stole, it is alleged that he made online purchases, opened gambling accounts and impersonated victims’ family members. Outsourcing application development allows organizations to realize cost savings and provides the flexibility necessary to scale. However, as

Read more

DevSecOps: Paradigm shifts are messy, but someone’s got to take the lead

Source:- infoworld.com A perfect storm of factors brewing in the dev, ops, and security worlds have created a window of opportunity to embed security into the application delivery lifecycle, in a needle-moving kind of way. However, security teams need to be the ones driving the DevSecOps charge or that needle will barely wobble. Given how many security practitioners spend their days putting out fires, adding “DevSecOps evangelist” to their job description is more likely to elicit groans than spur the desire

Read more

Advantages of Interactive Application Security Testing (IAST) over Static and Dynamic Testing

Source – contrastsecurity.com Interactive Application Security Testing (IAST) works in fundamentally different ways than static or dynamic tools using instrumentation technology. IAST leverages information from inside the running application, including runtime requests, data flow, control flow, libraries, and connections, to find vulnerabilities accurately. Because of this, interactive testing works better for application security. That’s why we created Contrast — to utilize next-generation technology to solve the growing problems inside the application security field. Because of this, interactive testing works better for application security. That’s

Read more

The intersection of DevOps and application security

Source – csoonline.com I’m sure you’ve seen the DevOps concept in development today. It focuses on bringing stability and reliability to corporate infrastructures and clouds. For example, many corporations have firewalls that protect the corporate infrastructure. DevOps would have any change to the firewall policy be versioned within a source code control system. This versioning is great because it enables a rollback to a stable version of the policy when a change goes awry. That improves reliability. Imagine DevOps being deployed

Read more

Resources for DevOps Pros to Learn About Security

Source:- threatstack.com These days, security should be part of everyone’s job. This is especially true for DevOps teams, which are responsible for developing, delivering, and maintaining critical applications for many organizations, and must therefore prioritize security as part of their role. But the world of security can seem like a bit of a mystery until you’ve been exposed to it. If you or someone on your team is looking to learn more about what it takes to run a secure

Read more
1 2