Application Security stories - Page 2
F5 integrates BIG-IQ into Venafi Machine Identity Protection Platform
The integration allows network operations to orchestrate the lifecycle of SSL/TLS certificates and ensure security policies are enforced across devices.
A10 Networks launches proxy for secure access and visibility into SaaS apps
The CAP solution ensures that access to SaaS applications and data is secured while maintaining centralised visibility across sanctioned and unsanctioned applications.
AlgoSec announces new features to improve Cisco ACI automation and application visibility
AlgoSec A30 release delivers new automation capabilities that enable zero-touch security management across SDN, cloud and on-premise networks.
Slack tackles balance between productivity and security
The new features include more options to protect data without interrupting employees’ requirements to get work done.
Financial institutions' websites most frequently attacked – report
Positive Technologies found that the majority of all web attacks in 2018 targeted sites of financial institutions, transportation companies, hospitality and entertainment companies.
TIBCO and Ping Identity partner on API security solution
“Few enterprises take a standardised approach across their company to ensure the security of data and other digital assets, which are exposed via APIs.”
Fortinet extends application security on Amazon Web Services
Fortinet to secure applications on AWS with FortiWeb Cloud WAF-as-a-Service while protecting applications and APIs and addressing compliance requirements.
App chat – it’s time to talk to employees about workplace tools and apps
One minute the workforce has a structured list of approved business applications and then the next minute, there are 30 different unknown products and tools being used.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
When hackers get the munchies, they just steal McDonalds
What happens when hackers get the munchies? Apparently in Canada, they decide to put their ‘hamburglar’ gloves on and go after unwitting people who happen to use the McDonalds app.
Interview: vArmour on using visibility to create secure application policies
Companies are adopting cloud applications at an increased rate, leaving security solutions to keep up.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t.
Interview: How Netskope is enabling secure use of cloud apps
Netskope has found that approximately 1000 applications are adopted by employees without the knowledge of IT staff, presenting a challenge for security teams.
The three-pronged security approach to multi-cloud environments
Popular methods don't necessarily catch all traffic - a particular concern for policy management.
Global application security firm launches VAR channel partner programme
A Swiss-based application security testing firm has launched a global value-added reseller (VAR) channel partner programme.
'What's a DDoS?' Why APAC IT teams think employees are reckless
IT teams may see employee behaviour as reckless or negligent, but 90% believe that it’s because of a lack of education.
Firewall-as-a-Service industry will top $2.5b by 2024
The Firewall-as-a-Service industry is expected to undergo rapid growth that could surpass $2.5 billion by 2024.
Canberra GovPitch event opens doors for local cybersecurity firms
Australian cybersecurity software provider Airlock Digital has drummed up interest from government departments and distributors following GovPitch,.
Unit 42 discovers apps compromised by iFrames on Google Play
A number of apps appearing on Google Play contained IFrames infections that link to malicious domains in their HTML pages. Unit42 gives details.
The time is now - Secure your organisation from threats you can and can't see
There are two types of companies; Those that have been hacked, and those who don’t know they have been hacked.