APPLICATION SECURITY

Applications are the engine of the modern enterprise and contain the most critical data, so keeping applications safe from hackers is the number one concern of IT security teams. We cover everything from application security measures and patches to protecting critical servers and databases to keep your most valuable customer and application data safe.

LATEST APPLICATION SECURITY ARTICLES

Twistlock Bolsters Container Security Platform with Cloud Native App Firewall

|

The company's new dynamic firewall technology ensures that only legitimate traffic gets through.

READ MORE

Microsoft Patches 19 Critical Vulnerabilities in July Patch Tuesday Update

|

A total of 54 flaws in total are now patched, including a critical issue in the HoloLens VR technology.

READ MORE

SiteLock's SMART/DB Protects SMB WordPress Websites

|

The company launches a private beta of its security solution for WordPress databases.

READ MORE

11 Top Security Technologies for 2017

|

Key technologies, according to Gartner, will range from cloud workload protection platforms to managed detection and response solutions.

READ MORE

Trusona Raises $10M to Kill Passwords

|

The startup raises attracts millions of dollars from Microsoft Ventures and Kleiner Perkins.

READ MORE

TOP APPLICATION SECURITY RESOURCES

IDENTITY AND ACCESS MANAGEMENT

We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

APPLICATION FIREWALLS

Application firewalls are a critical security layer between web traffic and your application server.

READ MORE

MULTI-FACTOR AUTHENTICATION

A comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics, and vendors, and what to learn before adopting an MFA solution.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

TLS/SSL: Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data..

TLS/SSL: Where Are We Today?

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network...

Breach Detection Systems: Product Selection Guide

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such...

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding...

Advanced Endpoint Protection: Strategic Guidance

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining...
 
SEE ALL WHITEPAPERS
 
Almost Half of All Third-Party Software Components Are Outdated, Insecure

Almost Half of All Third-Party Software Components Are Outdated, Insecure

|

In almost every case, a more secure version of the software component is available, a recent study found.

READ MORE
IBM Cloud Identity Connect Brings IDaaS to Hybrid Cloud Shops

IBM Cloud Identity Connect Brings IDaaS to Hybrid Cloud Shops

|

IBM Cloud Identity Connect brings secure single sign-on capabilities to businesses looking to manage user access on-premises and in the cloud.

READ MORE
Google Patches Android and Chrome for Security Vulnerabilities

Google Patches Android and Chrome for Security Vulnerabilities

|

Android June update and Chrome 59 provide fixes for security flaws.

READ MORE
OneLogin Password Manager Hacked

OneLogin Password Manager Hacked

|

All customers served by the company's U.S. data center are affected.

READ MORE