<iframe src="//www.googletagmanager.com/ns.html?id=GTM-KXSCJR" height="0" width="0" style="display:none;visibility:hidden">

What Questions Would a CISO Ask About Prevoty Runtime Security?

Audrey Sunu | Sep 12, 2016

Dr. Edward G. Amoroso, former CISO
of AT&T and now founding CEO of TAG Cyber, is dedicated to advancing the practice of information security and make best-in-class knowledge available to the community of security leaders. In this excerpt from his new three-part report, he interviews Julien Bellanger, CEO and Co-Founder of Prevoty about runtime technologies and the future of application security.

Continue reading

Topics: Application Security, RASP, Industry commentary, AppSec, Runtime Application Self-Protection, Runtime Application Security, TAG Cyber

RASP: The Proof is in the Pudding

Dr. Edward G. Amoroso | Sep 8, 2016

ed2.jpegThis guest post was written by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T; Current CEO of TAG Cyber, LLC. 

Continue reading

Topics: RASP, Industry commentary, Guest Contributions, Runtime Application Security, TAG Cyber

Six Application Security Predictions for 2016

Arpit Joshipura | Jan 22, 2016

This post originally appeared on CSO Online.

2016 is upon us and it is time to review what we think will happen in the world of application security in this fast-paced world. Security is always evolving just as attacks, hacks and vulnerabilities shift and as new technologies enter the landscape. Security must adapt in order to protect businesses, consumers and treasured data. Can today’s security practices achieve security assurances, rooted in sound computability theory? We believe so.

Continue reading

Topics: Application Security, RASP, Industry commentary, DevOps, Signatures

Building bridges in a fractured security ecosystem

Audrey Sunu | Dec 7, 2015

CSO Online contributing writer Kacy Zurkus recently interviewed Prevoty CEO Julien Bellanger for a news piece on contemporary approaches to securing legacy applications. Kacy's analysis uncovered an attack environment that is changing rapidly. The full article, which is cited below, originally appeared here

Continue reading

Topics: Application Security, Legacy Apps, Industry commentary, DevOps

AppSec in the News: November Roundup

Audrey Sunu | Dec 3, 2015

The security industry is constantly morphing to address new threats and needs, which is why we find it so important to stay up to date. Below is an industry news roundup from November.

Five reasons why hackers easily get in, CSO

Vulnerable web applications have become the weakest link in major breaches. Yet, most organizations have still not implemented any type of application security to protect them.

Continue reading

Topics: Application Security, Industry commentary

Sinking Your Hooks In Applications

Joe Rozner | Oct 21, 2015

The application security space has grown up. The focus shifted from security at the perimeter to security where the attacks are actually happening. As attacks on applications proliferate, it’s become abundantly clear that there is a real problem in the software we build. We as modern companies have a lot of applications: legacy applications, applications we don’t even have the source to anymore, and applications we’re unable to modify due to a lack of resources.

Over the past two and a half years, our team has focused not only on building the bleeding edge in application security technology but also on making it easier than ever to integrate into all kinds of applications as seamlessly as possible. Richard Meester and I recently had the opportunity to present at OWASP’s AppSecUSA conference in San Francisco and share with the the attendees how we at Prevoty do what we do. This post summarizes what Richard and I covered in our talk, which details our techniques for using middleware and instrumentation as methods for introducing tooling into applications and improving security.

Continue reading

Topics: Application Security, Tech Zone, Industry commentary

Your Enterprise Application Portfolio: Large, Complex, Unwieldy – and Essential

Derek Brink | Oct 14, 2015

If information is the lifeblood of the modern enterprise, then by analogy applications are the beating heart of the enterprise that enables this information to flow freely throughout the corporate body – to the users and business processes that need it, when they need it (any time), and where they need it (from any location, on any device, over any network). By all measures, your enterprise’s portfolio of applications is essential to its pursuit of its strategic business objectives.

Continue reading

Topics: Application Security, Industry commentary, Guest Contributions

Where does security fit in bi-modal IT departments?

Audrey Sunu | Sep 22, 2015

CSO Online discusses the issue that “Security is moving at a pace that’s outpacing even agile at this point based on the cyber threats that are quickly emerging.” So our question is, can IT departments serve as both builders and protectors?

Continue reading

Topics: Industry commentary

Application security needs to be shored up now

Audrey Sunu | Sep 14, 2015

CSO Online discusses the uprising of application security and its newfound importance in the past few years due to the large number of data breaches.

Continue reading

Topics: Application Security, Industry commentary

The modern application environment is complex & unwieldy. How do Visa, Hulu, and MSU secure it?

Audrey Sunu | Sep 8, 2015

Is the security of the modern application environment finally getting more of the attention it deserves? 

2015 marks a shift in the way enterprises interpret the risks associated with their applications. Not only have we learned that the highest number of confirmed data breaches over the past decade has been attacks on web applications1, but the average enterprise's portfolio of applications is growing -- and fast. New application security methodologies also emerge, including Runtime Application Self-Protection (RASP). People often wonder: What is RASP? Is it equipped to handle the next generation of threats? Will it live up to its expectations? 

Continue reading

Topics: Application Security, RASP, Industry commentary

Subscribe to Email Updates