John Zorabedian

John Zorabedian

John Zorabedian is a blogger, content marketer, and research editor. He has a background in marketing and journalism, writing about IT security, technology, business, politics and culture. He lives and works in the Boston area.

Stay up to date on Application Security

Posts by John Zorabedian
  • 4 Ways to Build a DevSecOps Culture
    | By John Zorabedian

    At the center of a successful DevOps initiative is a simple but often overlooked concept: Because developers drive the software agenda, developer participation is crucial for achieving a more secure framework. DevSecOps represents the next evolutionary step of secure software development, but even…

    Read Article
     
  • HipChat Breach Shows Dangers of…
    | By John Zorabedian

    This week, HipChat advised customers that one of its databases was breached by attackers who exploited a vulnerable third-party library used on HipChat.com. HipChat, owned by Atlassian, said that the compromised database stored customer usernames, email addresses, hashed passwords, and room…

    Read Article
     
  • Magento Zero-Day Leaves 200,000 Online…
    | By John Zorabedian

    Security researchers are warning of ahigh-risk vulnerability in Magento Community Edition, another reminder of systemic risk in our digital economy, which is built upon software and applications that need continuous monitoring. The Magento vulnerability could allow attackers to execute arbitrary…

    Read Article
     
  • 10 Gadgets and Skills of Superhero…
    | By John Zorabedian

    Developers perform heroic feats every day, frequently at night, and sometimes on weekends. You might not always get the recognition you deserve, but you still need to keep your skills sharp to survive in a fast-moving Agile or DevOps shop. When you master the skills and tools you need to do your…

    Read Article
     
  • WikiLeaks, Vault 7, and Vulnerability…
    | By John Zorabedian

    If you're hit by ransomware, you're presented with a difficult choice. Do you pay the ransom and hope the crooks follow through and return your ransomed data and files? Or do you refuse to pay, and say goodbye to that data forever? Tech companies including Microsoft, Google, Apple and Samsung are…

    Read Article
     
  • Strange But True Application Security…
    | By John Zorabedian

    Mark Twain famously said, "truth is stranger than fiction." I doubt even he could invent the strange events that unfold daily in our newsfeeds. In the realm of cybersecurity, however, breaches and vulnerabilities are becoming so frequent as to be predictable. Nevertheless, some of the most notable…

    Read Article