There are two sides to any story - and it is no different here for Healthcare. While the applications in this sector are vulnerable, they still aren't as vulnerable as Retail applications. At the same time, consumers have personal responsibilit
The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Alice and Bob were also joined by an additional cast of char
Download the supporting report hereDid the pandemic accelerate the adoption of technology in the education sector? This month we focus on education as we go back to school!Stay tuned for more upcoming episodes and reports on the AppSec Stats Fl
Special Guest: Jeremiah Grossman, Founder of WhiteHat Security and current Founder and CEO at Bit DiscoveryLinks for further reading & listening:https://www.scientificamerican.com/article/rumsfelds-wisdom/https://uxdesign.cc/the-knowns-and-unkn
Download the supporting report hereRising Windows of Exposure, increasing time to fix, falling remediation rates and pedestrian vulnerabilities make it easy for hackers to exploit vulnerabilities in business applications.Stay tuned for more upc
Download the accompanying report here.Applications are more vulnerable than last year. Time to fix serious vulnerabilities is increasing. Remediation rates are decreasing and the types of vulnerabilities that applications suffer from have not c
Download the supporting report hereIn this episode, we make a case for “Two Speed” Application Security to address the disparate needs of Legacy Applications and newer Greenfield Applications. In addition, hear about some simple takeaways for e
Download the supporting report hereHackers are not always an adversary – they can be heroes too. This month we dive into the hacker mindset and review the insightful data points and trends that our teams are finding and analyzing. Special Guest
Download the supporting report hereRead about the SAP CVE: SAP Security Notes March 2020: Two Critical Patches Released to Protect Solution Manager from CyberattacksWatch Simon Sinek's Ted Talk: Start with Why - How Great Leaders Inspire Action
Download the supporting report hereApplications are part of complex, connected systems with unpredictable amounts of interactions between other applications and APIs. Are our security programs strong enough to prevent supply chain type attacks?
Download the supporting report here.Learn more about HTTP Strict Transport Security.It's 2021 and we have more detailed security breach data than ever. Then how is the state of application security still so dismal and what if we look at it with
Download the supporting report here.In this month’s AppSec Stats Flash, we will dive into the first 3 key metrics when evaluating the current state of application security as well as broach the topic of shared responsibility for security as is