The Ultimate Guide to Application Security
2024 edition
Overview
When security is built directly into the programs used for any task or purpose (applications) it is Application Security. Examples include authentication, access control encryption and logging. Such features are typically added to improve protection of the applications from unauthorised users or malware, and contribute to improved organisational security.
Analyst reports
Gartner on Firewalls
Radware introduces AI SOC Xpert for enhanced security
4 days ago
Gartner on Cybersecurity
Radware named major player in IDC MarketScape WAAP repo...
Thu, 19th Sep 2024
IDC on Hyperscale
F5 announces advancements in multi-cloud networking par...
Thu, 22nd Aug 2024
IDC on Malware
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Gartner on Cybersecurity
Radware launches DNSaaS & NoKey to boost cloud services
Thu, 25th Jul 2024
Expert columns
By Christy Wyatt of Absolute Security
Cyber resilience: Key takeaways from a global IT outage
Mon, 2nd Sep 2024
By Josh Lemos of GitLab
It's more than culture: Addressing the root cause of co...
Thu, 22nd Aug 2024
By Matias Madou of Secure Code Warrior
How AI can help developers boost the security of new co...
Mon, 24th Jun 2024
By Erin Stephan of Aqua Security
Debunking cloud native security risks
Wed, 12th Jun 2024
By Craig Nielsen of GitLab
Preparing for a new AI-driven era in software developme...
Tue, 11th Jun 2024
More expert columns
By Josh Lemos of GitLab
Can AI be used to finally secure software and data supp...
Tue, 28th May 2024
By Matt Caffrey of Barracuda
Too much of a good thing? How security sprawl can weake...
Fri, 17th May 2024
By Scott Hesford of BeyondTrust
How your organisation can get exception handling of one...
Tue, 14th May 2024
By Matias Madou of Secure Code Warrior
Secure code starts with a training commitment to develo...
Fri, 26th Apr 2024
By Crystal Morin of Sysdig
Cloud-native security: Best practices vs. convenience a...
Wed, 20th Mar 2024
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Tue, 12th Mar 2024
Recent news
About Engineering
Sonatype & OpenText unite for enhanced app security
2 days ago
About Cloud Security
Check Point leads in GigaOm's cloud security report
3 days ago
About Software-as-a-Service
DuploCloud launches cost-effective observability suite
3 days ago
About DevOps
Microsoft integrates Endor Labs' solution into Defender
3 days ago
About Collaboration
Dynatrace joins Microsoft security group to enhance clo...
3 days ago
More news
About Developers
Security challenges of generative AI in software develo...
5 days ago
About DevSecOps
GitLab & Illumio reveal AI & cybersecurity trends for 2...
5 days ago
About Firewalls
Tide Foundation unveils innovative cybersecurity system...
6 days ago
About Cloud Services
Radware expands DDoS protection with CPaaS provider
This month
About Security Posture
GitGuardian report highlights rising secrets security c...
Last month
Even more news
About Customers
Study reveals severe security flaws in finance software
Last month
About Cloud Security
Sysdig report highlights soaring costs of cloud attacks
Last month
About Software-as-a-Service
Extreme Networks introduces advanced ZTNA security feat...
Last month
About Firewalls
US energy sector faces critical cybersecurity challenge...
Last month
About Digital Transformation
Fastly launches automated DDoS protection service globa...
Last month
Job moves
Move at Symantec
Sysdig names William Welch as new CEO, eyeing growth
3 days ago
Move at CA Technologies
Saviynt appoints Ehud Amiri as Senior VP for Product Ma...
Thu, 19th Sep 2024
Move at Microsoft
Inbal Shani joins Checkmarx board to drive strategic gr...
Sun, 18th Aug 2024
Move at Trend Micro
Trend Micro appoints Chris Zamagias to lead ANZ partner...
Tue, 23rd Jul 2024
Move at Nexxen
Major coup for Mindgard with new VP from cybersecurity ...
Fri, 1st Mar 2024
Other guides
You can read other related guides from Software Development, Cybersecurity, Breach Prevention, Application Performance Monitoring, and DevSecOps.
Powered by