Pierluigi Paganini is Chief Information Security Officer at Bit4Id, Editor-in-Chief at "Cyber Defense Magazine," a member of the DarkReading Editorial team, and a regular contributor for major publications in the cyber security field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, and The Hacker News Magazine.
- What Causes An Information Security Program to Fail?December 18, 2015 | Managing AppSec
Most successful, high-profile security incidents are caused by the failure of an information security program. In many cases, the exploitation of a vulnerability in an application is the root cause of major attacks. In recent years, the number of successful cyberattacks has been consistently increasing, and data breaches represent a large percentage of these offensives. More than one-third of… READ MORE
Stay up to date on Application Security
When it comes to application security in a workplace, one of the main challenges is due to the misconception that it's hard to implement and very difficult to maintain. This fallacy mainly derives from a lack of awareness regarding cyberthreats and the correct way to mitigate them. AppSec represents a challenge for any organization because in the majority of cases, internal personnel aren't… READ MORE
- The New Information Security Career Path for CISOsOctober 22, 2015 | Intro to AppSec
An organization's security posture is becoming a key success factor. As cybersecurity becomes more essential, the role of the chief information security officer (CISO) is rapidly evolving — and with it the information security career path. A recent Forrester report, entitled "Evolve To Become The 2018 CISO Or Face Extinction," highlights how the CISO role is shifting to that of a business manager… READ MORE
- Third-Party Application Security Risks in Modern CompaniesOctober 15, 2015 | Intro to AppSec
How do companies approach third-party application security? With more and more services and products relying on third parties to facilitate software development, that's an important question. Third-party code can have a significant impact on cybersecurity, introducing risks at the same time as it speeds up business processes. And if firms fail to take those risks seriously, the effects can be… READ MORE
Veracode recently released its "State of Software Security Volume 6: Focus on Industry Verticals" report, which includes the results of the vulnerability assessments the company conducted on hundreds of thousands of applications. The report is a useful resource for helping organizations evaluate their application security and mitigate their risk of exposure to cyberthreats. Key Takeaways Since… READ MORE
- Veracode Survey Highlights the Effects of Cybercrime on a Global Level
You already know cybercrime is serious (and costly), with cyberattacks responsible for $12.7 million in losses for US-based companies alone, according to the Ponemon Institute's "2014 Cost of Cyber Crime" study. And you know it's time-intensive: The same study concludes that the average amount of time spent by US companies to resolve a cyberattack was 45 days — an alarming figure, to say the… READ MORE
- The Rise in Global Cyberattacks Highlights the Dangers of CyberespionageAugust 19, 2015 | Security News
Recently, the US government announced that a major data breach, likely backed by Chinese hackers, had exposed the data of over 4 million government workers. Government officials believe this incident could be one of the largest breaches of federal employees' data. Though drastic, this is just one of many episodes demonstrating the rise of cybercrime. The number of cyberattacks on the global scale… READ MORE
- Smart Devices Pose Many Challenges to IoT Security — Is Your Company Up to the Challenge?July 30, 2015 | Security News
Internet of Things (IoT) devices are everywhere, and they're not going away any time soon: Experts at Cisco speculate that in 2020 there will be more than 50 billion connected devices, including wearable health, connected vehicles and smart grids. And the paradigm set by the ever-present gadgets has significantly changed society's perception of technology, with almost every sector adopting IoT… READ MORE
The role of the chief information security officer (CISO) has changed profoundly over the years, from IT security management to high-level risk management. Today a CISO is a crucial figure for any organization — a company executive responsible for establishing and maintaining a firm's security strategy. CISOs coordinate internal experts in an effort to identify threats and vulnerabilities, and… READ MORE
- The State of Malware and the Banking Trojan
It's no secret financial institutions are under constant attack. For online banking services, a banking Trojan is among the most aggressive cyberthreats. With a growing number of criminal crews using banking malware, financial institutions must adapt their security policies to protect their online customers — and their money. Financial Trojans in 2014: The Good News In March 2015, security… READ MORE
Application Security Tool Kit
Love to learn about Application Security?
Get all the latest news, tips and articles delivered right to your inbox.
No thanks, back to the article please.