Artificial intelligence (AI) is accelerating the pace of software development more than ever before. Applications are getting bigger, more complex, more powerful — and there are more of them. At the ...
Thales today announced the Controlled Availability of Imperva for Google Cloud, bringing the industry's most trusted ...
SPI Dynamics – These days, the biggest threat to an organization’s network security comes from its public Web site and the Web-based applications found there. Unlike internal-only network services ...
Belgian cybersecurity company Aikido Security NV today announced that it had raised $60 million in new funding at a $1 billion valuation to further enhance its unified platform for code, cloud and ...
PORTLAND, Ore.--(BUSINESS WIRE)--Orca Security, the pioneer of agentless cloud security, today announced new application security capabilities that unify security, DevOps and development teams to ...
The Open Web Application Security Project (OWASP) is updating its look at the risk and defensive landscape of artificial intelligence (AI), reflecting the fast adoption of the technology and the ...
Application security startup Rein Security Inc. formally launched today with a promise to address critical blind spots in application and artificial intelligence security. Founded by industry veterans ...
Eric Marchewitz is a field solution architect with a 23-year career in cybersecurity solutions, working for companies such as PGP Security, McAfee, Cisco and Check Point. He is also a CISSP and cloud ...
PLEASANTON, Calif. & LAS VEGAS--(BUSINESS WIRE)--Contrast Security, the Runtime Security company, today introduced Application Detection and Response (ADR). Contrast Security ADR empowers security ...
Most breaches don’t outsmart your stack; they walk through a permissive load balancer you tuned for speed instead of trust. For a long time, I thought of the load balancer as a performance device. Its ...
Eric Olden, Strata Identity CEO. An enterprise cloud identity expert, multi-exit serial entrepreneur and coauthor of the SAML SSO standard. Managing applications across distributed IT environments is ...
We meet Ian Mountford, a governance, risk and compliance consultant who transitioned into cyber security late in his career after being the victim of a hack. Ian talks about his rich and varied career ...