Whitepaper

TO ENCRYPT, OR NOT TO ENCRYPT: WHAT IS THE REGULATION?

Regulations in many countries require organizations to secure and encrypt any communications with their customers. The downside: those organizations now have to grapple with threats that hide within encrypted traffic. The use of codes and ciphers to protect sensitive information began thousands of years ago—the well-known “Caesar cipher” is named for Julius Caesar, who used

7 STEPS TO SIMPLIFY MIGRATING ARCHITECTURES TO THE CLOUD

The good news is that if you’re like most companies, you’ve done this before. Many times. About every three to five years you overhaul your core architectures. You adjust how you deliver applications. You strive to increase performance, enhance security, and reduce costs. The bad news is that with cloud, things will be even more

2019 PHISHING AND FRAUD REPORT

Welcome to F5 Labs’ third annual report on phishing and fraud. Once again, we’re bringing you data from our partner Webroot as well as the F5 Security Operations Center. Phishing continues to be a major source of profit for cyber-criminals, and a big hassle for cyber-defenders. In the F5 Labs 2019 Application Protection Report, F5

4 Ways to Increase Developer Buy-In of AppSec

Today, most organizations are in a race to deliver new, innovative software before their competitors. In turn, they have gone from bi-annual software releases to daily, hourly, or even by-the-minute releases. To keep up with these rapid deployments, security has had to shift from being a late-stage blocker, to an integrated part of the development

STATE OF SOFTWARE SECURITY Open Source Edition

Application security is one of the great frontiers in information security Apart from the code that is authored by developers, virtually no modern application can avoid including open source libraries that provide functionality that would be extremely tedious to write from scratch. Whether we’re looking at a relatively common library with a rich feature set,

Veracode Security Labs

HANDS-ON LABS TO SHIFT SECURITY KNOWLEDGE LEFT WITH VERACODE When it comes to software, developers are really the only ones in an organization who can fix the vulnerabilities in their code. Yet developers often don’t have the training they need to identify or remediate vulnerabilities and to code securely to reduce the number of vulnerabilities

No Touching: Contact Free Payment Options

The Declining Use of Cash. The use of cash has sharply declined in recent years. Since Covid-19 crisis started, we’ve seen a lot of shops stop taking cash, to minimise the risk of spreading infection, and embedding further the behaviour of consumers to Contactless payments. We have set out some practical considerations on contact free

The Ripple Effect Of Excellent EX

Organizations must empower, inspire, and enable their employees to serve their customers better. And employees want the best technology, devices, and applications at their fingertips to do so. All workers have an identity, which is shared across their values — and this is exactly what organizations must appeal to in order to attract and retain