The Ultimate Guide to Application Security
2024 edition
Overview
When security is built directly into the programs used for any task or purpose (applications) it is Application Security. Examples include authentication, access control encryption and logging. Such features are typically added to improve protection of the applications from unauthorised users or malware, and contribute to improved organisational security.
Analyst reports
Gartner on Digital Transformation
Cyber security spending to hit USD $212B amid AI threat...
Last month
Gartner on Firewalls
Radware introduces AI SOC Xpert for enhanced security
Last month
Gartner on Cybersecurity
Radware named major player in IDC MarketScape WAAP repo...
Thu, 19th Sep 2024
IDC on Hyperscale
F5 announces advancements in multi-cloud networking par...
Thu, 22nd Aug 2024
IDC on Malware
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Expert columns
By Doug Ko of Sysdig
Cloud costs: You cannot manage what you cannot see
5 days ago
By Christy Wyatt of Absolute Security
Cyber resilience: Key takeaways from a global IT outage
Mon, 2nd Sep 2024
By Josh Lemos of GitLab
It's more than culture: Addressing the root cause of co...
Thu, 22nd Aug 2024
By Matias Madou of Secure Code Warrior
How AI can help developers boost the security of new co...
Mon, 24th Jun 2024
By Erin Stephan of Aqua Security
Debunking cloud native security risks
Wed, 12th Jun 2024
More expert columns
By Craig Nielsen of GitLab
Preparing for a new AI-driven era in software developme...
Tue, 11th Jun 2024
By Josh Lemos of GitLab
Can AI be used to finally secure software and data supp...
Tue, 28th May 2024
By Matt Caffrey of Barracuda
Too much of a good thing? How security sprawl can weake...
Fri, 17th May 2024
By Scott Hesford of BeyondTrust
How your organisation can get exception handling of one...
Tue, 14th May 2024
By Matias Madou of Secure Code Warrior
Secure code starts with a training commitment to develo...
Fri, 26th Apr 2024
By Crystal Morin of Sysdig
Cloud-native security: Best practices vs. convenience a...
Wed, 20th Mar 2024
Recent news
About Global Positioning System
Drive mate enables GPS on cars, opens new hub near Sydn...
5 days ago
About Government
Open source malware up 156%, Sonatype research shows
Last week
About Customer Experience
Upwind launches Shift Left to enhance build-time securi...
Last week
About Digital Transformation
Cybersecurity trends 2025: AI, consolidation, nation-st...
Last week
About Cloud Services
Sumo Logic launches AI tools for dynamic observability
Last week
More news
About IT professionals
IT pros face challenges with AI in app development by 2...
This month
About DevOps
OpenText partners with Secure Code Warrior to boost sec...
This month
About Privacy
GitLab & AWS launch AI-based software development platf...
This month
About IT Debt
Veracode unveils new AI-driven features for Veracode Fi...
This month
About Firewalls
Radware enhances security for major Indian airport
Last month
Even more news
About Engineering
Sonatype & OpenText unite for enhanced app security
Last month
About Cloud Security
Check Point leads in GigaOm's cloud security report
Last month
About Software-as-a-Service
DuploCloud launches cost-effective observability suite
Last month
About DevOps
Microsoft integrates Endor Labs' solution into Defender
Last month
About Collaboration
Dynatrace joins Microsoft security group to enhance clo...
Last month
Job moves
Move at Symantec
Sysdig names William Welch as new CEO, eyeing growth
Last month
Move at CA Technologies
Saviynt appoints Ehud Amiri as Senior VP for Product Ma...
Thu, 19th Sep 2024
Move at Microsoft
Inbal Shani joins Checkmarx board to drive strategic gr...
Sun, 18th Aug 2024
Move at Trend Micro
Trend Micro appoints Chris Zamagias to lead ANZ partner...
Tue, 23rd Jul 2024
Move at Nexxen
Major coup for Mindgard with new VP from cybersecurity ...
Fri, 1st Mar 2024
Other guides
You can read other related guides from Software Development, Cybersecurity, Breach Prevention, Application Performance Monitoring, and DevSecOps.
Powered by