APIs and IaC – Two New AppSec Imperatives for Development and Security Teams

Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…

Anatomy of a DDoS Attack – the Plex Media Server Reflection/Amplification Attacks

Earlier this year, NETSCOUT announced that it had identified a new attack vector that was being leveraged to launch DDoS attacks across the public Internet. The vector was a protocol incorporated into the Plex Media Server (Plex) application that –…

Security Considerations Drive Air Force to Get Agile

Software and applications have taken on an outsized role in today’s government – helping agencies and military organizations more effectively and efficiently accomplish their missions and service constituents. But to keep pace with innovation, stay ahead of adversaries and keep…

Security as Code — a faster, safer approach to AppSec

Right in the middle of the holiday season, as much of the world was preparing to take some deserved time off to celebrate with their families and bid 2020 a less-than-fond farewell, some terrible news broke involving a number of…

Nation-state attack on government validates concerns about AppSec and supply chain security

One of the top trends that we witnessed covering government and military cybersecurity in 2020 – aside from the massive upswing in threats that accompanied the ongoing COVID-19 pandemic – was a renewed and increased focus on securing the supply…

How Application-Layer Encryption Closes the Gaps in Disk Encryption

This article was originally featured on the Ubiq blog. To read the original in its entirety, click HERE. As cliché as it sounds, data is a company’s most valuable commodity and cyber threat actors are taking increasingly drastic steps to…

Five Reasons to Prioritize AppSec in Your Agency

This article was originally published on the Checkmarx blog. Click HERE to see the original article in its entirety. These days, technology is evolving at a pace like never before seen, forcing organizations into an “adapt or die” situation. And,…

Four Ways DevSecOps Improves Application Security

Data breaches occur so frequently that it wouldn’t be surprising if the average American is becoming desensitized to them. It would be even less surprising if they’ve failed to notice that breaches are happening more frequently as cyberattacks increase in…

Why a new approach to encryption is essential for today’s government applications

Over the past decade, the role of software in the federal government has evolved from something that increased operational efficiency or made life easier, to completely mission-critical to agencies and military organizations. Software is key to federal digital transformation initiatives,…

Are government networks secure against cyber threats in 2020?

Last month was National Cybersecurity Awareness Month, which cyber professionals, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) claim is an opportunity to, “…raise awareness about the importance of cybersecurity across our Nation, ensuring…