Skip to main content

Pierluigi Paganini

Pierluigi Paganini is Chief Information Security Officer at Bit4Id, Editor-in-Chief at "Cyber Defense Magazine," a member of the DarkReading Editorial team, and a regular contributor for major publications in the cyber security field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, and The Hacker News Magazine.

Posts by Pierluigi Paganini
  • What Causes An Information Security Program to Fail?

    Most successful, high-profile security incidents are caused by the failure of an information security program. In many cases, the exploitation of a vulnerability in an application is the root cause of major attacks. In recent years, the number of successful cyberattacks has been consistently increasing, and data breaches represent a large percentage of these offensives. More than one-third of… READ MORE

Stay up to date on Application Security

  • Third-Party Application Security Risks in Modern Companies

    How do companies approach third-party application security? With more and more services and products relying on third parties to facilitate software development, that's an important question. Third-party code can have a significant impact on cybersecurity, introducing risks at the same time as it speeds up business processes. And if firms fail to take those risks seriously, the effects can be… READ MORE

  • Benchmarking Your Industry in Today's Software Security Landscape

    Veracode recently released its "State of Software Security Volume 6: Focus on Industry Verticals" report, which includes the results of the vulnerability assessments the company conducted on hundreds of thousands of applications. The report is a useful resource for helping organizations evaluate their application security and mitigate their risk of exposure to cyberthreats. Key Takeaways Since… READ MORE

  • Smart Devices Pose Many Challenges to IoT Security — Is Your Company Up to the Challenge?

    Internet of Things (IoT) devices are everywhere, and they're not going away any time soon: Experts at Cisco speculate that in 2020 there will be more than 50 billion connected devices, including wearable health, connected vehicles and smart grids. And the paradigm set by the ever-present gadgets has significantly changed society's perception of technology, with almost every sector adopting IoT… READ MORE

  • Mobile App Security: Threats and Best Practices

    Mobile device adoption is strategic for every industry, but it has inherent security risks that cannot be underestimated. Many companies offer their employees access to internal systems through mobile platforms; for this reason, an effective bring your own device (BYOD) policy that specifically addresses mobile app security is key. A recent study from Veracode found the average global enterprise… READ MORE

  • IoT security - Veracode study demonstrates the lack of security posture

    The Internet of Things devices are everywhere, their diffusion is becoming capillary, but we must carefully consider the aspects related to the IoT security. Internet of Things is the paradigm that most of all is changing our approach to the technology enlarging our surface of attack, a recent research conducted by the security firm Veracode revealed that household IoT devices are exposing users… READ MORE

  • Companies Worldwide Are Adopting Agile Development Techniques

    Secure Agile development is a mature, iterative, collaborative methodology that splits the overall development process into smaller phases, or "sprints." A growing number of companies worldwide are adopting Agile, believing it's an efficient way to design robust applications that are resilient to cyberattacks. The best way to understand the global diffusion of Agile development is to survey… READ MORE

  • Cybercriminals, Hacktivists, and More: Know Your Online Banking Security Threats

    With the rapid diffusion of online banking services — and the growing number of cyberattacks against them — financial institutions are finding it necessary now more than ever to enhance their online banking security. But who are the hackers responsible for these threats, and what's their motivation? Here's a closer look at the principal categories of attackers who pose threats to online banking… READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.