Pierluigi Paganini is Chief Information Security Officer at Bit4Id, Editor-in-Chief at "Cyber Defense Magazine," a member of the DarkReading Editorial team, and a regular contributor for major publications in the cyber security field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, and The Hacker News Magazine.
- What Causes An Information Security Program to Fail?December 18, 2015 | Managing AppSec
Most successful, high-profile security incidents are caused by the failure of an information security program. In many cases, the exploitation of a vulnerability in an application is the root cause of major attacks. In recent years, the number of successful cyberattacks has been consistently increasing, and data breaches represent a large percentage of these offensives. More than one-third of… READ MORE
Stay up to date on Application Security
- Third-Party Application Security Risks in Modern CompaniesOctober 15, 2015 | Intro to AppSec
How do companies approach third-party application security? With more and more services and products relying on third parties to facilitate software development, that's an important question. Third-party code can have a significant impact on cybersecurity, introducing risks at the same time as it speeds up business processes. And if firms fail to take those risks seriously, the effects can be… READ MORE
Veracode recently released its "State of Software Security Volume 6: Focus on Industry Verticals" report, which includes the results of the vulnerability assessments the company conducted on hundreds of thousands of applications. The report is a useful resource for helping organizations evaluate their application security and mitigate their risk of exposure to cyberthreats. Key Takeaways Since… READ MORE
- Smart Devices Pose Many Challenges to IoT Security — Is Your Company Up to the Challenge?July 30, 2015 | Security News
Internet of Things (IoT) devices are everywhere, and they're not going away any time soon: Experts at Cisco speculate that in 2020 there will be more than 50 billion connected devices, including wearable health, connected vehicles and smart grids. And the paradigm set by the ever-present gadgets has significantly changed society's perception of technology, with almost every sector adopting IoT… READ MORE
- Mobile App Security: Threats and Best Practices
Mobile device adoption is strategic for every industry, but it has inherent security risks that cannot be underestimated. Many companies offer their employees access to internal systems through mobile platforms; for this reason, an effective bring your own device (BYOD) policy that specifically addresses mobile app security is key. A recent study from Veracode found the average global enterprise… READ MORE
The Internet of Things devices are everywhere, their diffusion is becoming capillary, but we must carefully consider the aspects related to the IoT security. Internet of Things is the paradigm that most of all is changing our approach to the technology enlarging our surface of attack, a recent research conducted by the security firm Veracode revealed that household IoT devices are exposing users… READ MORE
Secure Agile development is a mature, iterative, collaborative methodology that splits the overall development process into smaller phases, or "sprints." A growing number of companies worldwide are adopting Agile, believing it's an efficient way to design robust applications that are resilient to cyberattacks. The best way to understand the global diffusion of Agile development is to survey… READ MORE
With the rapid diffusion of online banking services — and the growing number of cyberattacks against them — financial institutions are finding it necessary now more than ever to enhance their online banking security. But who are the hackers responsible for these threats, and what's their motivation? Here's a closer look at the principal categories of attackers who pose threats to online banking… READ MORE
Application Security Tool Kit
Love to learn about Application Security?
Get all the latest news, tips and articles delivered right to your inbox.
No thanks, back to the article please.