Please turn on your JavaScript for this page to function normally.
hardware
The benefits of implementing continuous security in the development lifecycle

Wabbi published new research with IDG that finds companies utilizing continuous security have decreased vulnerabilities by 50%. The study focused on the integration of …

bomb
Is next-gen threat modeling even about threats?

The threat landscape evolves with technology, and as threats grow in sophistication, there are concerns about major events like the Colonial Pipeline ransomware attack or the …

Terminal
Why low-code and identity must co-exist

Software development has emerged as a critical task for organizations looking to compete in the digital economy. It increasingly fuels innovation and even disruption. Yet, …

bulb
What makes a successful development team?

CircleCI unveiled its report on the state of software delivery, examining two years of data from more than a quarter billion workflows and nearly 50,000 organizations around …

code
The simple secret to app security? Time

The thing about being a security consultant is that people are always looking to you for the “secret” to building a secure digital anything. And by “secret,” they usually mean …

fix
The importance of building in security during software development

Checkmarx released the UK findings of its report which found that 45% of organizations have suffered at least two security breaches as a direct result of a vulnerable …

open source
The Linux Foundation’s Census of OSS app libraries helps prioritize security work

The Linux Foundation announced the final release of “Census II of Free and Open Source Software – Application Libraries,” which identifies more than one thousand of the …

cloud
Take a dev-centric approach to cloud-native AppSec testing

The era of the cloud-native application is well and truly upon us: IDC researchers have predicted that by 2023, more that 500 million apps will be developed using cloud-native …

open source
Software supply chain security still a pain point

ActiveState announced the results of its survey, providing insights into the security challenges of the software industry’s open source supply chain, which includes the …

code
How do I select an API security solution for my business?

As the importance of Application Programming Interfaces (APIs) continues to grow and API traffic accelerates, there’s a growing need to make sure it completes its tasks …

magnify
The importance of implementing security scanning in the software development lifecycle

Veracode published a research that finds most applications are now scanned around three times a week, compared to just two or three times a year a decade ago. This represents …

programming
Low code applications are essential for cybersecurity development in applications

One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …

Don't miss

Cybersecurity news