Pierluigi Paganini

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, Editor-in-Chief at "Cyber Defense Magazine," a member of the DarkReading Editorial team, and a regular contributor for major publications in the cyber security field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, and The Hacker News Magazine.
Posts by Pierluigi Paganini

What Causes An Information Security Program to Fail?

December 18, 2015  | Managing AppSec

Most successful, high-profile security incidents are caused by the failure of an information security program. In many cases, the exploitation of a vulnerability in an application is the root cause of major attacks. In recent years, the number of successful cyberattacks has been consistently increasing, and data breaches represent a large percentage of these offensives. More than one-third of... READ MORE

Don't Let AppSec Misconceptions Lead You Astray

December 17, 2015  | Intro to AppSec

When it comes to application security in a workplace, one of the main challenges is due to the misconception that it's hard to implement and very difficult to maintain. This fallacy mainly derives from a lack of awareness regarding cyberthreats and the correct way to mitigate them. AppSec represents a challenge for any organization because in the majority of cases, internal personnel aren... READ MORE

The New Information Security Career Path for CISOs

October 22, 2015  | Intro to AppSec

An organization's security posture is becoming a key success factor. As cybersecurity becomes more essential, the role of the chief information security officer (CISO) is rapidly evolving — and with it the information security career path. A recent Forrester report, entitled "Evolve To Become The 2018 CISO Or Face Extinction," highlights how the CISO role is shifting to that... READ MORE

Third-Party Application Security Risks in Modern Companies

October 15, 2015  | Intro to AppSec

How do companies approach third-party application security? With more and more services and products relying on third parties to facilitate software development, that's an important question. Third-party code can have a significant impact on cybersecurity, introducing risks at the same time as it speeds up business processes. And if firms fail to take those risks seriously, the effects can be... READ MORE

Benchmarking Your Industry in Today's Software Security Landscape

October 7, 2015

Veracode recently released its "State of Software Security Volume 6: Focus on Industry Verticals" report, which includes the results of the vulnerability assessments the company conducted on hundreds of thousands of applications. The report is a useful resource for helping organizations evaluate their application security and mitigate their risk of exposure to cyberthreats. Key... READ MORE

Veracode Survey Highlights the Effects of Cybercrime on a Global Level

September 11, 2015

You already know cybercrime is serious (and costly), with cyberattacks responsible for $12.7 million in losses for US-based companies alone, according to the Ponemon Institute's "2014 Cost of Cyber Crime" study. And you know it's time-intensive: The same study concludes that the average amount of time spent by US companies to resolve a cyberattack was 45 days — an alarming... READ MORE

The Rise in Global Cyberattacks Highlights the Dangers of Cyberespionage

August 19, 2015  | Security News

Recently, the US government announced that a major data breach, likely backed by Chinese hackers, had exposed the data of over 4 million government workers. Government officials believe this incident could be one of the largest breaches of federal employees' data. Though drastic, this is just one of many episodes demonstrating the rise of cybercrime. The number of cyberattacks on the global... READ MORE

Smart Devices Pose Many Challenges to IoT Security — Is Your Company Up to the Challenge?

July 30, 2015  | Security News

Internet of Things (IoT) devices are everywhere, and they're not going away any time soon: Experts at Cisco speculate that in 2020 there will be more than 50 billion connected devices, including wearable health, connected vehicles and smart grids. And the paradigm set by the ever-present gadgets has significantly changed society's perception of technology, with almost every sector... READ MORE

Chief Information Security Officer: A Role in Rapid Evolution

July 15, 2015

The role of the chief information security officer (CISO) has changed profoundly over the years, from IT security management to high-level risk management. Today a CISO is a crucial figure for any organization — a company executive responsible for establishing and maintaining a firm's security strategy. CISOs coordinate internal experts in an effort to identify threats and... READ MORE

The State of Malware and the Banking Trojan

June 18, 2015

It's no secret financial institutions are under constant attack. For online banking services, a banking Trojan is among the most aggressive cyberthreats. With a growing number of criminal crews using banking malware, financial institutions must adapt their security policies to protect their online customers — and their money. Financial Trojans in 2014: The Good News In March 2015,... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu