application development
How Low-Code/No-Code App Development Affects IT Security
While low-code and no-code application development is a couple decades old, the train truly left the station just a few years ago. It has been gaining considerable steam ever since. So popular ...
The Evolution of Application Development
pplication development has gone through an array of stages. Challenges relating to it got so taxing that in 2001 several noted developers got together to establish the Agile Manifesto. Its goal was ...
Low-Code/No-Code App Dev’s Inherent Security Risks
Many organizations now rely on low-code/no-code app development platforms to cost-efficiently address a variety of application needs in different aspects of business operations. A recent survey revealed that 47% of organizations are ...
Common Goals are Essential for Successful DevSecOps
At the heart of having a successful vulnerability management program is alignment between development, security, and operations teams (dubbed DevSecOps) in being able to achieve both innovation and security when delivering products—the ...
Fundamental Security Concepts and Best Practices Every Game Developer Should Know
Gaming is now the world’s favorite form of entertainment, with Newzoo reporting that by 2023 there will be more than three billion gamers across the planet. With the growth of multiplayer games, ...
Forrester Report Reveals the 5 Benefits IT Teams Really Need from API Security Tools
An Application Programming Interface (API) is a software intermediary that allows applications to communicate with one another. APIs provide routines, protocols, and tools for developers to facilitate and accelerate the creation of ...
Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud
By Arun Balakrishnan, Sr. Director Product ManagementPhoto by Markus Spiske on UnsplashIdentity credentials and source code are critical assets that can create major risks for your organization when exposed by breaches of third-party ...
Secure Software Summit: The State of OSS Supply Chain Security
By Dan Lorenc, ChainguardThis article is part of a series showcasing learnings from the Secure Software SummitPhoto by Reproductive Health Supplies Coalition on UnsplashThe Open Source Software (OSS) Supply Chain is under attack. As ...
The Complete Guide to Securing Your Software Development Lifecycle
How to improve the security of your application with strong DevSecOpsPhoto by 愚木混株 cdd20 on UnsplashThe unfortunate reality is this: application security is in an abysmal state. Industry research reveals that 80% of ...
Key Considerations When Choosing a SAST
We take a look at 11 key criteria when choosing a static analysis tool for modern codePhoto by Caleb Jones on UnsplashFor companies writing and maintaining software at scale today, SAST (Static Application Security ...