While it’s difficult to get permission from one’s corporate communications team or legal department on chatting with vendors, I was able to secure an interview with one of our financial services customers who use both Dynamic and Source code scanning.
In this article, I’m going to help you interpret how the different parts of this cybersecurity regulation touch on AppSec – that is, your websites, your mobile applications, your internal payment systems and networked third-party services.
There’s a routine to every large company with a DevOps team; from Christmas to New Year’s, there’s going to be a production freeze. Everyone rushes project schedules through November into early December.
This article provides an executive summary on the Blockchain technology, what it is, how it works, and why everyone is excited about it.
When it comes to cybersecurity, there is a common enemy and collaborating with industry peers in sharing threat information is critical to understanding and addressing cybercrime.
With 95% of cyberattacks being financially motivated, it’s no wonder that the threat attackers flock to where the money is. Your business and technology innovations are introducing new vulnerabilities and complexities in your applications ecosystem overnight, so you need to be proactive and vigilant.