Top

Tag: application security


Cybersecurity, Security

7 application security startups at RSAC 2024

May 14, 2024

Via: InfoWorld

The innovation hub of RSAC 2024, the RSAC Early Stage Expo was specifically designed to showcase emerging players in the information security industry. Among the 50 exhibitors crammed into the second floor booth space, seven VC-backed up-and-comers in application security […]


Cybersecurity, Security

Application Security vs. API Security: What is the difference?

February 28, 2023

Via: Hacker News

As digital transformation takes hold and businesses become increasingly reliant on digital services, it has become more important than ever to secure applications and APIs (Application Programming Interfaces). With that said, application security and API security are two critical components […]


Computing, Software & Applications

Public package repos expose thousands of API security tokens—and they’re active

October 18, 2022

Via: Info World

As part of the development of JFrog Xray’s new Secrets Detection feature, we wanted to test our detection capabilities on as much real world data as possible, both to make sure we eliminate false positives and to catch any errant […]


Computing, Data Management

How to protect your Kubernetes infrastructure from the Argo CD vulnerability

February 23, 2022

Via: Info World

Argo CD is a popular open source, continuous delivery (CD) platform for Kubernetes that is used by hundreds of organizations globally. Recently, a serious vulnerability in Argo CD was uncovered by Apiiro, which enables attackers to access sensitive information such […]


Hacking, Security

2022: The year of software supply chain security

January 4, 2022

Via: Info World

If 2020 was the year that we became acutely aware of the consumer goods supply chain (toilet paper, anyone? Anyone?), then 2021 was the year that the software supply chain rose in our collective consciousness. In perhaps the most infamous […]


Privacy, Security

What app developers need to do now to fight Log4j exploits

December 27, 2021

Via: Info World

Earlier this month, security researchers uncovered a series of major vulnerabilities in the Log4j Java software that is used in tens of thousands of web applications. The code is widely used across consumer and enterprise systems, in everything from Minecraft, […]


Computing, Software & Applications

How developers scrambled to secure the Log4j vulnerability

December 16, 2021

Via: Info World

Last weekend, the internet caught fire, and it is still unclear just how many developers with fire extinguishers will be needed to bring it under control. There was a set of first responders on the scene, however: largely unpaid maintainers […]


Computing, Software & Applications

Securing the Kubernetes software supply chain

December 15, 2021

Via: Info World

Modern software development practices make securing the software supply chain more important than ever. Our code has dependencies on open source libraries which have dependencies on other libraries and so on—a chain of code that we didn’t develop, didn’t compile, […]


Privacy, Security

Integrate security into CI/CD with the Trivy scanner

December 7, 2021

Via: Info World

Attacks on cloud-native infrastructures are on the rise. Research over a six-month period in 2021 shows a 26% increase in attacks on container environments over the previous six months. Malicious actors are targeting the auto-build process, packing the payloads, using […]


Computing, Software & Applications

The race to secure Kubernetes at run time

November 17, 2021

Via: Info World

For software developers who primarily build their applications as a set of microservices deployed using containers and orchestrated with Kubernetes, a whole new set of security considerations has emerged beyond the build phase. Unlike hardening a cluster, defending at run […]


Cybersecurity, Security

Importance of Application Security and Customer Data Protection to a Startup

January 21, 2021

Via: The Hacker News

When you are a startup, there are umpteen things that demand your attention. You must give your hundred percent (probably even more!) to work effectively and efficiently with the limited resources. Understandably, the application security importance may be pushed at […]


Performance, security, and availability

You too? Who’s on the hacker hit list

August 2, 2016

Via: Info World

Some users’ accounts are more attractive to malicious hackers than others. Computer security experts have long focused on local administrators/root — and recently even more on all-powerful network administrators such as members of the domain admin and enterprise admin groups. […]


Performance, security, and availability

Flaws in Symantec products expose millions of computers to hacking

June 30, 2016

Via: Info World

A Google security researcher has found high severity vulnerabilities in enterprise and consumer products from antivirus vendor Symantec that could be easily be exploited by hackers to take control of computers. Symantec released patches for the affected products, but while […]


Performance, security, and availability

Attackers are probing and exploiting ImageTragick flaws

May 10, 2016

Via: Info World

Over the past week security researchers have seen increasing attempts by hackers to find servers vulnerable to remote code execution vulnerabilities recently found in the ImageMagick Web server library. The flaws were publicly disclosed last Tuesday by researchers who had […]


Online Tools, Performance, security, and availability

Lenovo patches serious flaw in pre-installed support tool

May 9, 2016

Via: Info World

Lenovo has fixed a vulnerability in its Lenovo Solution Center support tool that could allow attackers to execute code with system privileges and take over computers. The Lenovo Solution Center (LSC) is an application that comes pre-installed on many Lenovo […]