Among the most debated questions in the constantly changing mobile application development, whether to include root detection ...
JP oversees the Research and Innovation teams that keep Onapsis on the cutting-edge of the business-critical application security market. In 2021, we commenced the year reeling from the aftermath of ...
The federal government’s ambitious plans to implement zero-trust security across federal agencies, while well-intentioned, will require substantially more funding and foundational technical work than ...
In the previous blog post, “Embedded Security Using Cryptography”, we looked at how cryptography can be used for securing assets in embedded systems and ensure confidentiality, integrity and ...
After over a decade of talking the zero-trust talk, with the launch of large-scale, end-to-end secure access service edge solutions (SASE), security and risk professionals are beginning to walk the ...
The concept of containerization has changed how applications are deployed and managed, offering flexibility and scalability. These changes have made compliance with security standards in containerized ...
AI-generated code is reshaping software development and introducing new security risks. Organizations must strengthen governance, expand testing and train developers to ensure AI-assisted coding ...
2023 was an eventful year for cloud security. We saw multiple high-profile incidents, such as the discovery of a far-reaching zero-day vulnerability in the MOVEit file transfer server application and ...
School district IT teams can save time and prevent threats by utilizing SSO, an important feature of identity management solutions. Educators are juggling a lot this year, especially as staff ...
Lockheed Martin is working with Google Cloud to integrate generative artificial intelligence. The Reston, Va., defense contractor said Thursday it plans to use Google's AI to train, deploy and sustain ...