The working life of a software security professional is many things: challenging, exciting, unpredictable... but rarely is it easy. And in most organizations, they can be siloed, working separately from operations teams and the developers tasked with creating new applications. It can make for a rather chilly reception...
Adopting a "security by design" approach and weaving it into the digital transformation road map helps organizations defend against cyberthreats, says Reem AlShammari, CISO at Kuwait Oil Co., who also advocates threat information sharing.
In a credential stuffing attack, this Fortune 50 company saw bots use millions of username and password combinations in an attempt to hijack the accounts of real customers. These attacks brought with them the potential for sales losses, brand damage, and being out of compliance. The limited deployment options and high...
DevSecOps applies application security testing during the CI stage to put "Sec" into DevOps, so to speak. Security tools must provide meaningful, actionable results in return.
In this presentation, I'll explain why development teams are increasingly turning to source code management (SCM) platforms to achieve their...
When software is everywhere, everything becomes an attack surface. The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, "Can the industry do a better job of writing more-secure code, making software applications nearly impenetrable to...
Security must be embedded into developer workflows during every stage of the SDLC.
Software development, delivery, and deployment is a continuous process. Be part of securing it!
This infographic provides 5 tips to help you move to a DevSecOps environment with ease.
Many applications use open source components, which can make it challenging to pinpoint any security issues. How can organizations gain better visibility of risks?
To ensure data and services are protected against attack, DevOps is evolving to incorporate
cybersecurity practices across the lifecycle. Organizations need to take into account the fast-moving
nature of continuous innovation, and a rapidly evolving and fragmented threat landscape: otherwise
security can get in the...
How can security and application development teams work more closely together to enhance cybersecurity? A panel of experts discusses critical security issues, including the role of microservices.
"The PCI DSS security requirements apply to all system components included in or connected to the cardholder data environment."
The cardholder data environment (CDE) is comprised of people, processes and technologies that store, process or transmit cardholder data or sensitive authentication data. "System...
Kubernetes has become the de facto operating system of the cloud. This rapid success is understandable, as Kubernetes makes it easy for developers to package their applications into portable microservices. However, Kubernetes can be challenging to operate. Teams often put off addressing security processes until they...
Contact-tracing apps are continuing to take shape around the world as the COVID-19 pandemic continues. Using privacy-by-design principles is critical to building trust in these apps, says privacy expert Ann Cavoukian.
DevOps is the leading way to develop, deliver and support applications. Businesses that adopt DevOps move faster and are better able to keep up with customer demands. But creating an agile, responsive, data-driven culture and processes is easier said than done.
Download your copy of The Road to DevOps Success to...
Based on a survey of cybersecurity and application-development professionals, this e-book examines the dynamics between development teams and cybersecurity teams regarding the deployment and management of application security solutions. Many industry verticals are represented, including manufacturing, financial...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.