The average cost of a security breach in a hybrid cloud environment is estimated at a staggering $3.6 million making it critical for organisations to make software security one of the most important priorities.
Cisco’s most recent report, based on the findings from two SlashData global surveys that targeted enterprise developers, uncovers developers’ exposure to API security exploits, their outlook on security, and how they use automation tools to detect and remediate threats.
Rapid uptake in adoption by industries ranging from banking to retail to autonomous vehicles of customer- and partner-facing and internal application programming interfaces (APIs) to drive internet traffic has resulted in an equally rapid growth in endpoint attacks – more than 11 billion over just 18 months according to a report from edge computing security leader Akamai. It makes sense that they are more vulnerable to threats from malicious actors, given API endpoints’ similarity to internet-facing web servers, and their role as pipelines between divergent platforms.
App development is becoming more and more popular, as web and software developers are migrating to the mobile industry. Secure development on mobile applications, however, has not shown the same level of growth or maturity. This article sums the best ways to build secure apps. It concentrates on OWASP top 10 (and similar) vulnerabilities, as these are most commonly found in mobile apps.
The security features of an app are often ignored in the rush to get a new product to market. We naturally tend to focus more on what an app should do, rather than what it shouldn’t. Making sure that an app doesn’t have security flaws is a difficult and potentially expensive process. There are…
SlashData © Copyright 2023| All rights reserved |Cookie Policy |Privacy Policy