Archive


Forrester Research recently analyzed the application security testing market (static analysis, dynamic analysis, and instrumented/interactive analysis technologies). This report details Forrester's findings about how well each vendor fulfills their criteria and where they stand in relation to each other to help security and risk professionals select the right partner for their application security requirements.

The Forrester Wave: Application Security



The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today's virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.

The Thriving Malware Industry: Cybercrime Made Easy




National security requires that U.S. military andgovernment IT systems have strong protections. To safeguard its networks, the U.S. Department of Defense recently moved from DIACAP (DoD Information Assurance Certification and Accreditation Process) to a more standardized and streamlined platform, the Risk Management Framework for DoD Information Technology (RMF for DoD IT).

Protecting Federal IT Systems:


Apps continue to become the new norm of business productivity; giving employees cross-device operability with instant access to decision-making data. Yet, many organizations still miss the mark, (or don't even try) to implement the safeguards on apps and company data, despite the billions of passwords and personal information shared by employees (whether knowingly or through new mobile malware threats).

Why is App Security Escaping Development?







The line-in-the-sand for securing and managing mobile devices in government agencies and public sector offices has been drawn. Now is the time to prepare for the guidelines set forth by the National Institute of Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) by exploring the vulnerabilities of mobility and mitigation strategies for complete mobile control with Mobile Device Management.

NIST & DOD Guidelines for Secure Mobile Device Management