The Biden administration has unveiled its new national cybersecurity strategy, detailing top challenges facing the U.S. and plans for addressing them. Goals include minimum security requirements for critical infrastructure sector organizations and liability for poor software development practices.
APIs represent the best and worst of times - "massive amounts of business value, but massive amounts of unmitigated risk," says Richard Bird, CSO, Traceable AI. In the past year, misconfigured or error-prone APIs resulted in high-profile breaches at Twitter and T-Mobile. He sees more on the horizon.
Organizations must grapple with software development happening at a faster pace than ever as well as an exponential increase in attacks on the software layer. Contrast Security has therefore developed new technology to secure code that's deployed quickly to the cloud, CEO Alan Naumann says.
Please join us for our Prisma Cloud Security Briefing to learn how Palo Alto Networks Prisma® Cloud can enable your organization to secure multicloud, hybrid and microservice environments with a single tool.
Prisma® Cloud is the industry’s most comprehensive cloud-native application protection platform(CNAPP)...
With rising customer expectations and increasing threats along with fast moving technology, today every company is a technology company - with security, availability, reliability, performance, and scalability their key concerns.
Organizations today need to scale applications and manage more traffic, address...
Snyk hauled in nearly $200 million just weeks after laying off 198 employees but had to slash its valuation by $1.1 billion to seal the deal. The company intends to use the Series G proceeds to enhance and expand its developer security platform through both organic investments and acquisitions.
Software has increasingly relied on components developed by third parties or from open-source libraries, which Aqua Security CEO Dror Davidoff says injects additional risk. On-premises environments are still managed in more traditional ways, with the development and production phases totally siloed.
Kalpesh Doshi has come a long way in cybersecurity. When he started out, some people mistakenly thought he was a security guard. Today, he has two decades of experience in information security, security audits, risk management and data protection, regulations, global standards and compliance.
Software life cycle management has always been part of the development team, but organizations are now looking to extend the process beyond the development team to manage the entire supply chain, says Nahas Mohammed, regional sales director at GitHub India.
DevSecOps is about security enablement at every stage within the organization - the people, process and technology. To begin the DevSecOps journey, organizations should enable and empower technology teams to think about secure design first, says GitHub's Hatim Matiwala.
As the pace of software development increases along with cloud migration to support it, organizations must take a new approach to security. DevSecOps—integrating security processes into the DevOps pipeline—can help organizations rapidly deliver secure and compliant application changes while running operations...
Palo Alto Networks will make its first major acquisition in nearly two years, scooping up application security startup Cider Security for $250 million. The Silicon Valley-based platform security behemoth will fork over $194.6 million of cash as well as $55.4 million of replacement equity for Cider.
The traditional application development model that puts security checks at the end of the process creates needless friction that slows down organizations, says Snyk solutions engineer Matt Mintzer. Application security specialists need to build tracks rather than guardrails for development, he says.
SOC has long been the eyes and ears of cybersecurity professionals. It has reached the point where the presence of an enterprise scale SOC has become nearly ubiquitous at large organizations.
The question to ask now is - How do we evolve the existing capabilities within our ever present SOCs to match the rapidly...
With massive digitization and cloud adoption, the attack surface has broadened and new threats have emerged. Challenges like ransomware, supply chain attacks and financial fraud continue to pose problems for security practitioners.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.