APPLICATION SECURITY

Applications are the engine of the modern enterprise and contain the most critical data, so keeping applications safe from hackers is the number one concern of IT security teams. We cover everything from application security measures and patches to protecting critical servers and databases to keep your most valuable customer and application data safe.

LATEST APPLICATION SECURITY ARTICLES

Contrast Security Secures $30 Million in New Funding

|

The application security specialist scores additional VC funding amid a cloud software boom.

READ MORE

Barracuda Debuts Active DDoS Prevention Service

|

The new cloud-based service provides businesses with both application security and protection from debilitating DDoS attacks.

READ MORE

The Secure Supply Chain: Where Security Starts

|

The next big front in the cyber security war could be the supply chain - and regulators are already looking at it.

READ MORE

Aqua Security Secures $25 Million in Funding for Container Security

|

The startup sets a record for container security funding amid intensifying demand from enterprises.

READ MORE

WhiteHat Launches Secure DevOps Learning Labs

|

The new online learning and resource hub helps enterprise developers build secure apps from the start.

READ MORE

TOP APPLICATION SECURITY RESOURCES

IDENTITY AND ACCESS MANAGEMENT

We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

APPLICATION FIREWALLS

Application firewalls are a critical security layer between web traffic and your application server.

READ MORE

MULTI-FACTOR AUTHENTICATION

A comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics, and vendors, and what to learn before adopting an MFA solution.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

TLS/SSL: Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data..

TLS/SSL: Where Are We Today?

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network...

Breach Detection Systems: Product Selection Guide

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such...

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding...

Advanced Endpoint Protection: Strategic Guidance

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining...
 
SEE ALL WHITEPAPERS
 
Plurilock's AI Authentication Tech Enlists in the Army

Plurilock's AI Authentication Tech Enlists in the Army

|

The U.S. Army's NETCOM unit will use Plurilock's BioTracker cybersecurity software to safeguard identities.

READ MORE
10 Top IAM Products

10 Top IAM Products

|

Identity and access management products control network and data access for users and devices across cloud and on-premises environments. We review 10 of the best IAM solutions.

READ MORE
Top 10 Enterprise Encryption Products

Top 10 Enterprise Encryption Products

|

Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.

READ MORE
Twistlock Bolsters Container Security Platform with Cloud Native App Firewall

Twistlock Bolsters Container Security Platform with Cloud Native App Firewall

|

The company's new dynamic firewall technology ensures that only legitimate traffic gets through.

READ MORE