The new CISO mandate: protect DevOps!
By Victor Ng | Aug 21, 2021 | Features, Newsletter, Software Development Lifecycle Security | 0
Application security – from code to cloud
By Victor Ng | Sep 12, 2022 | Cloud Security, Features, Software Development Lifecycle Security
From coding to cloud users, a developer-first approach to security could well be the best way to secure applications in the cloud-based digital economy.
Read MoreOvercoming the Costco Effect in software supply chain security
By Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group | Apr 13, 2022 | Newsletter, Opinions, Software Development Lifecycle Security
Underestimating the size of something critical that you have taken on can lead to fragmented management and increased business risks.
Read More6 questions businesses need to ask when tackling supply chain security
By CybersecAsia editors | Apr 7, 2022 | Newsletter, Software Development Lifecycle Security, Tips
Chances are your organization is using open source somewhere in your software development lifecycle, but is it secured?
Read MoreThe new CISO mandate: protect DevOps!
By Victor Ng | Aug 21, 2021 | Features, Newsletter, Software Development Lifecycle Security
CISOs and security teams are playing a larger role in application security today. But is that a good idea?
Read MoreEmbedding security into every phase of the software development lifecycle
By Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group | Jul 8, 2021 | Newsletter, Opinions, Software Development Lifecycle Security
Creating a secure software development lifecycle can lower risk, but security must be embedded into every step to ensure more secure applications.
Read MoreAPAC’s biggest application security challenges
By Victor Ng | May 20, 2021 | Cyberthreat Landscape, News, Newsletter, Software Development Lifecycle Security
New research shows organizations in the region struggle with bad bots, broken APIs, and supply chain attacks.
Read MoreApplication security in the DevOps environment
By Colin Bell, HCL AppScan CTO | Mar 2, 2021 | Software Development Lifecycle Security, Sponsored, Whitepapers
The consequences of attacks against unsecured applications are costly.
Read MoreContinuous security – putting it all together
By Colin Bell, HCL AppScan CTO | Feb 9, 2021 | Opinions, Software Development Lifecycle Security, Sponsored, Whitepapers
The pillars of continuous security – audit, metrics and governance working together.
Read MoreContinuous application security with HCL AppScan
By ESG | Feb 9, 2021 | Software Development Lifecycle Security, Sponsored, Whitepapers
IT is not getting easier; in fact, it’s getting more complex and dangerous.
Read MoreTime pressure leading to vulnerable apps
By Victor Ng | Sep 30, 2020 | Features, Newsletter, Software Development Lifecycle Security
Time pressure opens several areas of vulnerabilities in organizations’ software development lifecycle security.
Read MoreIdentifying security vulnerabilities without impacting workflow
By Synopsys | Jan 14, 2020 | Case Study, Software Development Lifecycle Security
In this case study done by Synopsys with El Al Israel Airlines, we show how the airline incorporated an application security testing solution that...
Read MoreHow to be more secure with containers
By Victor Ng | Dec 4, 2019 | Features, Software Development Lifecycle Security
While containers ensure separation in the application development lifecycle for security, how do we secure the platform itself? The endless quest...
Read MoreVulnerability exposes more than 10,000 Xiaomi smart pet feeders
By CybersecAsia editors | Oct 30, 2019 | IoT Security, News, Software Development Lifecycle Security
Feeding schedules and safety of pets at risk if hackers exploit this vulnerability, as well as exploit it for IoT attacks. A Russian security...
Read MoreDevSecOps: Making security by design real
By Shahnawaz Backer, Principal Security Advisor, APCJ, F5 Networks | Sep 25, 2019 | Digital Transformation, Opinions, Software Development Lifecycle Security
How does DevSecOps fit in the DevOps world, where security can impede speed?
Read MoreApple’s $1M bug bounty an arms race for zero-days
By Taylor Armerding, Software Security Expert, Synopsys Integrity Group | Sep 19, 2019 | Opinions, Software Development Lifecycle Security, White, Black & Grey Hat Hackers
Apple have expanded its bug bounty program to all researchers to US$1 million top prize to turn black hats white. Apple is taking bug bounties to a...
Read MoreKaspersky raises alarm over increasing targeted attacks against pharmaceuticals
By CybersecAsia editors | Sep 7, 2019 | Cyberthreat Landscape, News, Security Awareness & Education, Software Development Lifecycle Security
Widely used EMR systems open wider entry points for hackers targeting hospitals. Global cybersecurity company Kaspersky revealed an alarming trend...
Read MoreCybersecurity in the automotive industry
By Victor Ng | Aug 28, 2019 | Cyberthreat Landscape, Features, IoT Security, Security Trends & Developments, Software Development Lifecycle Security
How safe and secure are smart, connected and driverless cars? What are the cybersecurity concerns the automotive industry needs to pay attention to?
Read More
Voters-draw
Thales Gamification
Gamification listing
PARTICIPATE NOW |
|
Vote Now -Placment
BB HTC
Top-Sidebar-banner
Whitepapers
Post-Pandemic APAC Digital Transformation and OT Cyber Security
All you need to know about digital transformation and OT cybersecurity in Asia in the …Download WhitepaperFour Things to Consider to Successfully and Securely Run Critical Applications in the Cloud
Use this checklist to securely and successfully run critical applications in the cloud and maximize …Download WhitepaperCriteria Guide When Choosing An Endpoint Detection and Response (EDR) Solution
Use this checklist to make a more informed decision when choosing an endpoint detection and …Download WhitepaperCyber Threat Predictions for 2023 by FortiGuard Labs
Learn the cyber threat predictions in 2023 in this annual perspective by FortiGuard Labs.Download Whitepaper
Middle-sidebar-banner
Case Studies
Maxim’s ensures business continuity, rapid recovery of critical data with Veeam
Hong Kong F&B company reduces Recovery Time Objective (RTO) by 300% and cut costs by …Read moreSecure SD-Branch Facilitates Technology Kennards Hire Modernization
How secure SD-Branch facilitates the modernization of an Australian equipment rental companyRead moreFortinet Security Fabric Protects Yedpay’s New Cloud Environment
Yedpay Power Its Business Growth with Fortinet Security FabricRead moreCase Studies: 1.5 million lessons from the SingHealth hack
Learn the lessons from this post-mortem of a healthcare information hackRead more