As modern application development trends go, distributed microservices architecture has been one of the most popular and successful in recent memory.
This is the 14th year that we are publishing our annual WhiteHat Security Application Security Statistics report. Over the years, this report has become the authoritative take on the state of application security globally.
Data privacy is all about users’ personal data collected, stored or used by an organization, but are organizations doing enough to keep this data protected from unauthorized access?
The WhiteHat Security team is seeing a massive shift towards cloud adoption largely driven by organizations looking to reduce cost, mitigate risk, and to allow them to scale quickly and be agile with their resources.
“The more things change, the more they stay the same.” This simple, succinct proverb created in the 19thcentury by French novelist Jean-Baptiste Alphonse Karr continues to resonate in so many areas of our day-to-day lives.
If the title on your office door says, 'Chief Information Security Officer (CISO),' chances are, your days are consumed with the various risks your organization is facing, and how you’ll deal with them.
In this article, we’ll take a closer look at how research partners Vertical Structure and WhiteHat Security worked together to identify and verify a vulnerability, and then notify and work with the vendor to quickly and effectively remediate the issue and protect customers.
Back in March at the RSA Conference in San Francisco, WhiteHat announced that NTT Security Corporation, one of the world’s most respected security organizations, signed a definitive agreement to acquire WhiteHat. Throughout the past few months, we’ve been working closely with NTT Security to finalize all of the details of the acquisition...
Recently, I was out on a shopping trip at a department store, and I saw an employee scrambling to help the customers at the fitting room.
WhiteHat Security celebrates the 95th annual International Women in Engineering Day. Donna Estrin, senior director of corporate marketing gains insight from several women engineering experts at WhiteHat on their career experiences.
Rachel Andrews, DAST Security Specialist at WhiteHat Security, reflects on her recent experience at InfoSecurity Europe and growing trends in Cybersecurity.
Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. The majority of data breaches have to do with web application security vulnerabilities; and therefore, security must become part of the software development equation.
It’s no secret that the gender gap in technology is still an issue today.
Cross-Site Request Forgery (CSRF) generates many questions from prospects, customers, partners, and Web application security professionals we work with.
Is your organization compliant with the security standards and regulations implemented by your industry, state, or country that are applicable to your organization? If you answered yes, congratulations. Now, a follow-up question. Is your organization actually secure?
For women in cybersecurity looking to take the next step in their career, navigating that pathway can be challenging.
In today’s digital economy, time to market is everything. Organizations are expected to release applications and updates on a near-continuous basis, or risk being left behind by the competition.
As most people know, there are a lot of moving parts that go into running a cybersecurity company.
In the application security space, customers and prospects tell the same story time and time again:
Software composition analysis (SCA) allows organizations to identify third-party and open source components that have been integrated into all applications, and for each of these components, it identifies:
Everyone knows that there are two things that are certain in life: death and taxes.
The popularity of reusable software components has soared throughout the developer community in recent years, largely due to the convenience and time saving opportunities they offer.
For every 100KLOC, a monolithic application will have an average of 39 vulnerabilities, whereas a microservice application will have an average of 180 vulnerabilities.
After an exhilarating RSA 2019, where WhiteHat Security announced that NTT Security has signed a definitive agreement to acquire the company and cybersecurity vendors from all segments of the market came together to show their innovations to the world, it’s time to reflect on some of the key themes and concerns resulting from the show.
There’s been much public debate in the tech industry around a growing shortage of qualified tech talent that’s making it difficult for organizations to hire or find workers with the right skills or experience.
Over the past year, data breaches, through web, business, and mobile application exploitation, have continued to run rampant. In 2018, major household names like Ticketmaster, the United States Postal Service (USPS), Air Canada, and British Airways were hit by application-based exploits.
I recently had the opportunity to attend the fourth annual Watermark Women’s Conference held in Silicon Valley, and what an experience it was!
Today, March 8, marks International Women’s Day, a global day tabbed to celebrate women’s achievements throughout history and their social, economic, cultural and political achievements.
Today marks a big step for WhiteHat Security. I am delighted to announce that NTT Security Corporation, one of the world’s most respected security organizations, has signed a definitive agreement to acquire WhiteHat Security.