Snyk hauled in nearly $200 million just weeks after laying off 198 employees but had to slash its valuation by $1.1 billion to seal the deal. The company intends to use the Series G proceeds to enhance and expand its developer security platform through both organic investments and acquisitions.
Serverless adoption is rising rapidly. Recently, AWS released a new feature called Lambda function URLs. This feature enables configuring HTTP endpoints, to directly invoke lambda functions, without going through AWS API Gateway and other infrastructure. This means that other AWS services do not have to be provisioned...
Serverless architecture promises no infrastructure overhead, pay-as-you-go pricing, automated scale, and quick development and deployment. The implication is that less operational overhead translates to less complexity, less risk, and less worry. But serverless applications and environments are far from flawless,...
Software has increasingly relied on components developed by third parties or from open-source libraries, which Aqua Security CEO Dror Davidoff says injects additional risk. On-premises environments are still managed in more traditional ways, with the development and production phases totally siloed.
The SolarWinds attack in December 2020 put software supply chain security on the radar of many organizations, and new threats have been rapidly multiplying ever since. But surveys show that 71% of security professionals have misconceptions about what effective software supply chain security entails and have yet to...
Resiliency is a core topic in OWASP's Mobile Application Security Verification Standard. What's key context to know? Dan Shugrue of Digital.ai discusses how to deepen a DevSecOps program by training developers in code obfuscation, anti-tamper, RASP and monitoring.
As the pace of software development increases along with cloud migration to support it, organizations must take a new approach to security. DevSecOps—integrating security processes into the DevOps pipeline—can help organizations rapidly deliver secure and compliant application changes while running operations...
Palo Alto Networks will make its first major acquisition in nearly two years, scooping up application security startup Cider Security for $250 million. The Silicon Valley-based platform security behemoth will fork over $194.6 million of cash as well as $55.4 million of replacement equity for Cider.
The traditional application development model that puts security checks at the end of the process creates needless friction that slows down organizations, says Snyk solutions engineer Matt Mintzer. Application security specialists need to build tracks rather than guardrails for development, he says.
According to Gartner, “By 2025, 75% of application development teams will implement SCA tools in their workflow, up from 40% today, in order to minimize the security and licensing risks associated with open-source software.”
From this report, gain insight on how to ensure minimal disruption to your development...
Discover the top ten mistakes to avoid when implementing a secure software supply chain solution. Based on real user experiences with Sonatype Nexus Lifecycle, this approach delivers benefits that include reduced security and licensing risks, as well as improved time-to-market for new applications, resulting in...
There was one major problem when Equifax had to change its entire approach to transforming their IT environment — the management of open source libraries needed to be more advanced.
Learn how Sonatype's full-spectrum software supply chain automation with the Nexus Platform brought a holistic approach to managing...
DevSecOps has been described as part strategy, part toolkit, part training and part cultural shift.
However, there’s no universal playbook on how to implement DevSecOps, and there can be conflict between DevOps prioritizing speed to market, functionality and revenue generation, versus SecOps striving to eliminate...
The endpoint is the terminal on which companies' sensitive information is processed. This makes it a particular focus for potential attackers. But the classic security approach no longer works today: In the past, endpoints were managed from the data center and with central IT. The end devices worked in secure internal...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.