Top Features and Functionality to Look for When Selecting Application Security and Risk Management Solution
4 min read - An outline of the more detailed technical capabilities and functionality that clients and prospects should evaluate when selecting application security and risk management providers.
Securing Your Mobile Applications Doesn’t Have to Be So Overwhelming
3 min read - Security awareness is definitely growing. Increasingly, organizations understand the need, even the requirement, to protect sensitive mobile application data. But organizations are concerned and frustrated about how they can make their mobile applications more secure – some to the point…
Just When You Thought It Was Safe to Go Mobile, New Security Threats Emerge
5 min read - In order to address the growing market need for improved mobile protection, IBM is announcing two exciting new security solutions to protect web and mobile applications from threats and vulnerabilities, and to help you identify and fix vulnerabilities in mobile…
A New Vulnerability in the Android Framework: Fragment Injection
6 min read - We have recently disclosed a new vulnerability to the Android Security Team. The vulnerability affected many apps, including Settings (the one that is found on every Android device), Gmail, Google Now, DropBox and Evernote. To be more accurate, any App…
Top Resources to Get Started With Application Security Testing Today
3 min read - Web application attacks get a lot of media coverage and there’s no end of experts and analysts underscoring the importance of testing applications. But it can be hard to know where to start. Should you buy a tool? Take a…
First Steps to Securing Your Software
4 min read - Application security matters. Most executives get this at a high-level -- they've read enough of those bold headlines, they know they need to do something about “application security” but, unless that executive started out life on a development team, it's…