The Ultimate Guide to Application Security
2025 edition
Overview
When security is built directly into the programs used for any task or purpose (applications) it is Application Security. Examples include authentication, access control encryption and logging. Such features are typically added to improve protection of the applications from unauthorised users or malware, and contribute to improved organisational security.
Analyst reports
Gartner on Digital Transformation
Cyber security spending to hit USD $212B amid AI threat...
Thu, 28th Nov 2024
Gartner on Firewalls
Radware introduces AI SOC Xpert for enhanced security
Wed, 20th Nov 2024
Gartner on Cybersecurity
Radware named major player in IDC MarketScape WAAP repo...
Thu, 19th Sep 2024
IDC on Hyperscale
F5 announces advancements in multi-cloud networking par...
Thu, 22nd Aug 2024
IDC on Malware
Appdome unveils GenAI-powered Threat Resolution Center
Thu, 8th Aug 2024
Expert columns
By Doug Ko of Sysdig
Cloud costs: You cannot manage what you cannot see
Last month
By Christy Wyatt of Absolute Security
Cyber resilience: Key takeaways from a global IT outage
Mon, 2nd Sep 2024
By Josh Lemos of GitLab
It's more than culture: Addressing the root cause of co...
Thu, 22nd Aug 2024
By Matias Madou of Secure Code Warrior
How AI can help developers boost the security of new co...
Mon, 24th Jun 2024
By Erin Stephan of Aqua Security
Debunking cloud native security risks
Wed, 12th Jun 2024
More expert columns
By Craig Nielsen of GitLab
Preparing for a new AI-driven era in software developme...
Tue, 11th Jun 2024
By Josh Lemos of GitLab
Can AI be used to finally secure software and data supp...
Tue, 28th May 2024
By Matt Caffrey of Barracuda
Too much of a good thing? How security sprawl can weake...
Fri, 17th May 2024
By Scott Hesford of BeyondTrust
How your organisation can get exception handling of one...
Tue, 14th May 2024
By Matias Madou of Secure Code Warrior
Secure code starts with a training commitment to develo...
Fri, 26th Apr 2024
By Crystal Morin of Sysdig
Cloud-native security: Best practices vs. convenience a...
Wed, 20th Mar 2024
Recent news
About Security breaches
Mindgard secures $8m to expand AI security solutions an...
Today
About Transparency
Open source software challenges predicted to continue i...
Today
About Global Positioning System
Drive mate enables GPS on cars, opens new hub near Sydn...
Last month
About Government
Open source malware up 156%, Sonatype research shows
Last month
About Customer Experience
Upwind launches Shift Left to enhance build-time securi...
Last month
More news
About Digital Transformation
Cybersecurity trends 2025: AI, consolidation, nation-st...
Last month
About Cloud Services
Sumo Logic launches AI tools for dynamic observability
Last month
About IT professionals
IT pros face challenges with AI in app development by 2...
Last month
About DevOps
OpenText partners with Secure Code Warrior to boost sec...
Last month
About Privacy
GitLab & AWS launch AI-based software development platf...
Last month
Even more news
About IT Debt
Veracode unveils new AI-driven features for Veracode Fi...
Last month
About Firewalls
Radware enhances security for major Indian airport
Wed, 27th Nov 2024
About Engineering
Sonatype & OpenText unite for enhanced app security
Fri, 22nd Nov 2024
About Cloud Security
Check Point leads in GigaOm's cloud security report
Fri, 22nd Nov 2024
About Software-as-a-Service
DuploCloud launches cost-effective observability suite
Fri, 22nd Nov 2024
Job moves
Move at Symantec
Sysdig names William Welch as new CEO, eyeing growth
Fri, 22nd Nov 2024
Move at CA Technologies
Saviynt appoints Ehud Amiri as Senior VP for Product Ma...
Thu, 19th Sep 2024
Move at Microsoft
Inbal Shani joins Checkmarx board to drive strategic gr...
Sun, 18th Aug 2024
Move at Trend Micro
Trend Micro appoints Chris Zamagias to lead ANZ partner...
Tue, 23rd Jul 2024
Move at Nexxen
Major coup for Mindgard with new VP from cybersecurity ...
Fri, 1st Mar 2024
Other guides
You can read other related guides from Software Development, Cybersecurity, Breach Prevention, Application Performance Monitoring, and DevSecOps.
Powered by