Organizations must grapple with software development happening at a faster pace than ever as well as an exponential increase in attacks on the software layer. Contrast Security has therefore developed new technology to secure code that's deployed quickly to the cloud, CEO Alan Naumann says.
Seattle police have charged an online retailer's "shopping experience" software programmer with engineering a fraud scheme based on the movie "Office Space," in which malicious software was used to transfer a fraction of every transaction into an outside account.
The software risk landscape has changed – and not for the better. Malicious actors constantly evolve their tactics, techniques, and procedures (TTPs) to find new ways of infiltrating or disrupting organizations, and the software supply chain is now firmly in the crosshairs. A surge of sophisticated and diverse...
In the latest update, four ISMG editors discuss important issues of 2022, including: CISO Marene Allison's unique career path; Ukrainian government cybersecurity official Victor Zhora on lessons learned from countering cyberattacks; and insights from CEO Nikesh Arora of Palo Alto Networks.
Phishing and other socially-engineered schemes are going to get bolder, the attack surface is only going to get bigger, and enterprises everywhere are going to have to focus more on building cyber resilience. These are among the New Year's predictions from Zoom's new CISO, Michael Adams.
In this whitepaper, you will learn:
How to solve common challenges with application modernization
About the four key pillars of modernization: scale, security, observability, and governance
Guidelines for implementing the four capabilities
How NGINX can accelerate your modernization journey
Information Security Media Group asked some of the industry's leading cybersecurity experts about the trends to watch in 2023. Responses covered a variety of emerging threats and evolving trends affecting security technologies, leadership and regulation. Here is a look at the year ahead.
Identity and access management company Okta revealed that its private GitHub repositories were accessed earlier in the month, resulting in the theft of its source code in its Workforce Identity Cloud code repositories. "No customer data was impacted," Okta says.
With rising customer expectations and increasing threats along with fast moving technology, today every company is a technology company - with security, availability, reliability, performance, and scalability their key concerns.
Organizations today need to scale applications and manage more traffic, address...
The $250 million acquisition of Cider Security will allow Palo Alto Networks to secure a piece of code from development to its implementation in a runtime environment. CEO Nikesh Arora says the company must understand the tool sets and open-source widgets coming into the customer's supply chain.
The U.K. government on Friday released voluntary code of practice that will be monitored for compliance. The guidelines tell operators and developers to ensure that apps receive updates to fix security vulnerabilities and call for every app developer to establish a vulnerability disclosure process.
Approov has landed a new CEO to help the mobile security upstart expand in the United States and capture more healthcare and financial services customers. The Silicon Valley-based company has captured high-profile European customers such as BMW from its development center in Scotland.
Akamai's acquisition of Guardicore allowed the company to extend from protecting public-facing web content and APIs to safeguarding internal applications and data, says CEO Tom Leighton. The $600 million deal will allow the Boston-area firm to blend its public-facing and internal security assets.
Software has increasingly relied on components developed by third parties or from open-source libraries, which Aqua Security CEO Dror Davidoff says injects additional risk. On-premises environments are still managed in more traditional ways, with the development and production phases totally siloed.
Kalpesh Doshi has come a long way in cybersecurity. When he started out, some people mistakenly thought he was a security guard. Today, he has two decades of experience in information security, security audits, risk management and data protection, regulations, global standards and compliance.