Log4Shell: What enterprises need to know about the widespread and critical zero-day vulnerability
Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. The majority of data breaches have to do with web application security vulnerabilities; and therefore, security must become part of the software development equation.
Software composition analysis (SCA) allows organizations to identify third-party and open source components that have been integrated into all applications, and for each of these components, it identifies:
Shockingly, application security is an often-overlooked area in the enterprise cybersecurity lineup, despite its clear criticality.
On August 22, 2018, Apache Struts announced a security vulnerability and patch which remediates a critical remote code execution vulnerability. Apache Struts is a Java-based web application platform used by an estimated 65 percent of Fortune 100 companies. With this latest vulnerability, attackers can exploit a web application...
Learn what constitutes an ideal static analysis (SAST) solution, the importance of depth of coverage, and some causes of false positives – how they come up, why they happen, and what can be done about them.