Outsourcing application security has become a popular option among organizations globally. With data breaches becoming more common, companies risk losing sensitive data that could impact their business on a large scale affecting their integrity, brand reputation, market value, and customer relationships. Moreover, today's applications are often connected to various networks, systems, and end-users, so it's imperative that organizations ensure robust application security. However, with increasing customer demands and shorter release timelines, companies often struggle to maintain the security of their applications. Small and mid-sized businesses (SMBs) that have limited budgets for their cybersecurity often do not have the bandwidth to adequately perform cybersecurity functions while hiring skilled but expensive security professionals.
A few years back, when someone said "Artificial Intelligence" (AI), we immediately thought about Skynet, Terminator, Matrix, HAL 9000, J.A.R.V.I.S., and all the other SCI-Fi technologies we saw in movies. Since then, things have changed quite drastically. When you hear about AI, you expect a conversation about smart assistants like Siri, Cortana, Alexa, or you expect to hear about how IBM Watson won Jeopardy! AI slowly went past the research phase and made its way into multiple industries including healthcare, fashion, weather forecasting, teaching, and driving. IBM even made Chef Watson cook some food (and it didn't even taste that bad).
Acunetix, the pioneer in automated web application security software, will be participating in RSA Conference 2020 with a talk by one of the company's leading sales engineers, a live interview with Security Weekly, and a booth in the North Expo. Mark Schembri, Technical Sales Engineer at Acunetix, will present on "Benefits of Interactive Application Security Testing (IAST)," at the South Briefing Center, booth S-1500 on Tuesday, Feb. 25 at 12:10 pm. Schembri will talk about DAST solutions, their strengths and limitations, and how IAST may enhance their functionality by improving scan coverage and test result quality. Participants will also learn how quality improvements resulting from the use of IAST may benefit SDLC processes. Acunetix has also sponsored a booth at the conference and experts will be available at booth #6365 in the North Expo during the conference to answer questions and provide demos.
When users install mobile applications to their devices, the application requests specific permissions and access to various sensitive information such as contact lists, local storage, device cameras, network activities and your microphone. If and when an attacker hijacks one application with access to any of these permissions, the attacker may control the user device. Text messages, screen capture, and payment information can be easily compromised without proper security.