Collaborating Authors

Why do the Vast Majority of Applications Still Not Undergo Security Testing?


Did you know that 84% of all cyber attacks target applications, not networks? What's even more curious is that 80% of Internet of Things (IoT) applications aren't even tested for security vulnerabilities. It is 2018, and despite all the evidence around us, we haven't fully accepted the problem at hand when it comes to software security. Because we haven't accepted the problem, we are not making progress in addressing the associated vulnerabilities. Which is why after an active 2017, we are already seeing numerous new attacks before we leave the first quarter of the year.

Survey Says: Software Systems Spur Security Slowdown, but AI Can Help


Security staff are spending too much time on tasks that can be better handled by software. As noted by ZDNet, IT decision-makers estimate that employees waste three hours per day dealing with issues from application feature gaps, and security admins see that waste reach 10 hours per week, according to a study commissioned by LogRhythm.

Accelerating Security Innovation: Introducing the Palo Alto Networks Application Framework


At Palo Alto Networks, we strive to provide the most compelling security to our customers, delivered with the utmost consistency across the network, endpoint and cloud. We are trusted by more than 39,500 customers to protect their organizations, prevent cyberattacks, and help maintain trust in the digital age. Our decade-long journey was founded on two words: innovation and disruption. The time has come to once again help change the future of the security industry, but this time we aren't forging the way by ourselves - we are building on everything we have done and dramatically changing the consumption model for the most comprehensive security achievable. It is time to unleash security innovation, entrepreneurship and better protection for our customers.

Forget the network perimeter, say security vendors


What if all your company's computers and applications were connected directly to the Internet? That was the assumption behind BeyondCorp, a new model for network security that Google proposed back in 2014, and it's one that's starting to get some attention from networking and security vendors. Enterprises have moved beyond the traditional workspace in recent years, allowing employees to work remotely by using their personal devices and accessing apps in private or public clouds. To bring roaming workers back into the fold, under the security blanket of their local networks, companies rely on VPNs and endpoint software to enforce network access controls. Google's BeyondCorp approach to enterprise security takes the focus away from the network perimeter and puts it on devices and users.

Mobile Application Security - 5 Critical Do's and Don'ts - Appknox Mobile App Security, Resources, Best Practices & News


With each passing year, the importance of mobile application security is growing tremendously. A major part of this has been triggered by the press and media reporting on numerous hacks that have affected users and consumers across different segments ranging from casual gamers, to online shoppers to major bank frauds leading to millions of card details being leaked online. If you are a business, you are not likely to escape the enterprise mobility rush, but you can and definitely should avoid certain security mistakes while making sure that you follow certain industry practices to ensure that you've ensured multiple checkpoints within your system. BYOD or Bring Your Own Device allows employees to use personal mobile devices for work. This strategy has been gaining a lot of traction recently, especially by most small businesses.