{"id":1354122,"date":"2017-07-02T13:37:43","date_gmt":"2017-07-02T19:37:43","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1354122"},"modified":"2018-07-22T08:22:05","modified_gmt":"2018-07-22T12:22:05","slug":"application-security","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/application-security\/","title":{"rendered":"Application Security"},"content":{"rendered":"<div id=\"pl-1354122\"  class=\"panel-layout\" ><div id=\"pg-1354122-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1354122-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1354122-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1354122-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>Application Security<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1354122-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"188d6207p2\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037652\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/09\/canstockphoto35008730-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"Exabeam, CNAPP, cloud threat, detections, threats, CNAP, severless architecture, itte Broadcom report cloud security threat\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/\" class=\"_self cvplbd\" target=\"_self\" >Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\">Michael Vizard<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T08:16:40-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Three tiny people cleaning the inside of a hard drive\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037237\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png\" class=\"pt-cv-thumbnail img-none\" alt=\"A D-Link DSR-250N, which is now EOL\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">1 week ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#188d6207p2\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#188d6207p2\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-5772626gur\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1354122-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037652\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Exabeam, CNAPP, cloud threat, detections, threats, CNAP, severless architecture, itte Broadcom report cloud security threat\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/09\/canstockphoto35008730-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/exabeam-allies-with-wiz-to-integrate-cnapp-with-siem-platform\/\" class=\"_self cvplbd\" target=\"_self\" >Exabeam Allies With Wiz to Integrate CNAPP With SIEM Platform<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\">Michael Vizard<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-27T08:16:40-05:00\">November 27, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cnapp\/' title='cnapp' class='pt-cv-tax-cnapp'>cnapp<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/siem\/' title='SIEM' class='pt-cv-tax-siem'>SIEM<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Exabeam has allied with Wiz to gain access to security data collected from a cloud-native application protection platform (CNAPP) ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037631\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"The Elephant in AppSec Talks Highlight: Shifting Left Doesn&#039;t Mean Anything Anymore\" title=\"\" data-cvpsrc=\"https:\/\/escape.tech\/blog\/content\/images\/2024\/11\/Templates---BLOG--3---1-.svg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-talks-highlight-shifting-left-doesnt-mean-anything-anymore\/\" class=\"_self cvplbd\" target=\"_self\" >The Elephant in AppSec Talks Highlight: Shifting Left Doesn&#8217;t Mean Anything Anymore<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/sanjana-iyer\/\" rel=\"author\">Sanjana Iyer<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T10:24:43-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/application-security\/' title='Application Security' class='pt-cv-tax-application-security'>Application Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/shift-left\/' title='shift left' class='pt-cv-tax-shift-left'>shift left<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/the-elephant-in-appsec\/' title='The Elephant in AppSec' class='pt-cv-tax-the-elephant-in-appsec'>The Elephant in AppSec<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Discover key highlights from Tanya Janca's talk at The Elephant in AppSec Conference on shifting security to be present throughout the entire Software Development Lifecycle ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Escape - The API Security Blog&feed_id=1020&blog_url=https:\/\/escape.tech\/blog\/\">Escape - The API Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037597\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Three tiny people cleaning the inside of a hard drive\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/automatic-updates\/' title='automatic updates' class='pt-cv-tax-automatic-updates'>automatic updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-storage\/' title='data storage' class='pt-cv-tax-data-storage'>data storage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware\/' title='firmware' class='pt-cv-tax-firmware'>firmware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-patch\/' title='firmware patch' class='pt-cv-tax-firmware-patch'>firmware patch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-security\/' title='firmware security' class='pt-cv-tax-firmware-security'>firmware security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-update\/' title='firmware update' class='pt-cv-tax-firmware-update'>firmware update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-updates\/' title='Firmware Updates' class='pt-cv-tax-firmware-updates'>Firmware Updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-disk-drive\/' title='hard disk drive' class='pt-cv-tax-hard-disk-drive'>hard disk drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-drive\/' title='hard drive' class='pt-cv-tax-hard-drive'>hard drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nas\/' title='NAS' class='pt-cv-tax-nas'>NAS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/os-security-updates\/' title='os security updates' class='pt-cv-tax-os-security-updates'>os security updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qnap\/' title='QNAP' class='pt-cv-tax-qnap'>QNAP<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qts\/' title='QTS' class='pt-cv-tax-qts'>QTS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/raid\/' title='RAID' class='pt-cv-tax-raid'>RAID<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/release-management\/' title='Release Management' class='pt-cv-tax-release-management'>Release Management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-update\/' title='security update' class='pt-cv-tax-security-update'>security update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/storage\/' title='storage' class='pt-cv-tax-storage'>storage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">RAID FAIL: NAS Maker does a CrowdStrike\u2014cleanup on \/dev\/dsk\/c1t2d3s4 please ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037357\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-conference-panel-highlight-why-scaling-appsec-is-harder-than-you-think\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><span class=\"cvp-play\"><\/span><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"cvp-videothumb skip-lazy  cvplazy\" alt=\"Why Is Transforming Company Culture for Product Security So Challenging? \u239c Ariel Shin\" data-cvpsrc=\"https:\/\/i.ytimg.com\/vi\/F1XbZ0daDnA\/hqdefault.jpg\" \/><iframe title=\"Why Is Transforming Company Culture for Product Security So Challenging? \u239c Ariel Shin\" width=\"290\" height=\"163\" data-skip-lazy data-no-lazy class=\"cvp-videothumb\" data-cvpsrc=\"https:\/\/www.youtube.com\/embed\/F1XbZ0daDnA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-elephant-in-appsec-conference-panel-highlight-why-scaling-appsec-is-harder-than-you-think\/\" class=\"_self cvplbd\" target=\"_self\" >The Elephant in AppSec Conference Panel Highlight: Why scaling AppSec is harder than you think<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/sanjana-iyer\/\" rel=\"author\">Sanjana Iyer<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T08:00:20-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/application-security\/' title='Application Security' class='pt-cv-tax-application-security'>Application Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-champions\/' title='Security Champions' class='pt-cv-tax-security-champions'>Security Champions<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/shift-left\/' title='shift left' class='pt-cv-tax-shift-left'>shift left<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/the-elephant-in-appsec\/' title='The Elephant in AppSec' class='pt-cv-tax-the-elephant-in-appsec'>The Elephant in AppSec<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Key takeaways from highly experienced industry experts on how to scale application security from the panel in Track 1 of The Elephant in AppSec Conference ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Escape - The API Security Blog&feed_id=1020&blog_url=https:\/\/escape.tech\/blog\/\">Escape - The API Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037422\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/wrapping-up-a-decade-of-insights-from-the-state-of-the-software-supply-chain\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Wrapping up a decade of insights from the State of the Software Supply Chain\" title=\"\" data-cvpsrc=\"https:\/\/www.sonatype.com\/hubfs\/SSCR-blog-image@2x.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/wrapping-up-a-decade-of-insights-from-the-state-of-the-software-supply-chain\/\" class=\"_self cvplbd\" target=\"_self\" >Wrapping up a decade of insights from the State of the Software Supply Chain<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/aaron-linskens\/\" rel=\"author\">Aaron Linskens<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T13:13:06-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/open-source\/' title='open source' class='pt-cv-tax-open-source'>open source<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/secure-software-supply-chain\/' title='secure software supply chain' class='pt-cv-tax-secure-software-supply-chain'>secure software supply chain<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-supply-chain\/' title='software supply chain' class='pt-cv-tax-software-supply-chain'>software supply chain<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/state-of-the-software-supply-chain\/' title='State of the Software Supply Chain' class='pt-cv-tax-state-of-the-software-supply-chain'>State of the Software Supply Chain<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Sonatype's 10th annual State of the Software Supply Chain report marks a transformative decade for open source software ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=2024 Sonatype Blog&feed_id=644&blog_url=https:\/\/www.sonatype.com\/blog\">2024 Sonatype Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037237\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"A D-Link DSR-250N, which is now EOL\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037060\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"David \u201cdwizzzle\u201d Weston\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/david-weston-microsoft-security-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/microsoft-ignite-2024-security-crowdstrike-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Microsoft Veeps Ignite Fire Under CrowdStrike<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T12:03:14-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike\/' title='CrowdStrike' class='pt-cv-tax-crowdstrike'>CrowdStrike<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-falcon\/' title='CrowdStrike Falcon' class='pt-cv-tax-crowdstrike-falcon'>CrowdStrike Falcon<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-incident\/' title='CrowdStrike incident;' class='pt-cv-tax-crowdstrike-incident'>CrowdStrike incident;<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/crowdstrike-updates\/' title='crowdstrike updates' class='pt-cv-tax-crowdstrike-updates'>crowdstrike updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/david-weston\/' title='David Weston' class='pt-cv-tax-david-weston'>David Weston<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ignite\/' title='ignite' class='pt-cv-tax-ignite'>ignite<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft\/' title='Microsoft' class='pt-cv-tax-microsoft'>Microsoft<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-security\/' title='Microsoft security' class='pt-cv-tax-microsoft-security'>Microsoft security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-virus-initiative\/' title='Microsoft Virus Initiative' class='pt-cv-tax-microsoft-virus-initiative'>Microsoft Virus Initiative<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/microsoft-windows\/' title='Microsoft Windows' class='pt-cv-tax-microsoft-windows'>Microsoft Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/quick-machine-recovery\/' title='Quick Machine Recovery' class='pt-cv-tax-quick-machine-recovery'>Quick Machine Recovery<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/rust\/' title='rust' class='pt-cv-tax-rust'>rust<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/safe-deployment-practices\/' title='Safe Deployment Practices' class='pt-cv-tax-safe-deployment-practices'>Safe Deployment Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows\/' title='Windows' class='pt-cv-tax-windows'>Windows<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/windows-security\/' title='Windows security' class='pt-cv-tax-windows-security'>Windows security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">BSODs begone! Redmond business leaders line up to say what\u2019s new in Windows security ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037164\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/fortune-1000-at-risk-how-we-discovered-30k-exposed-apis-100k-api-vulnerabilities-in-the-worlds-largest-organizations\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Fortune 1000 at risk: How we discovered 30k exposed APIs &amp; 100k API vulnerabilities in the world\u2019s largest organizations\" title=\"\" data-cvpsrc=\"https:\/\/escape.tech\/blog\/content\/images\/2024\/11\/Report---Main-Visual.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/fortune-1000-at-risk-how-we-discovered-30k-exposed-apis-100k-api-vulnerabilities-in-the-worlds-largest-organizations\/\" class=\"_self cvplbd\" target=\"_self\" >Fortune 1000 at risk: How we discovered 30k exposed APIs &amp; 100k API vulnerabilities in the world\u2019s largest organizations<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/alexandra-charikova\/\" rel=\"author\">Alexandra Charikova<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T07:30:01-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/api-security\/' title='API security' class='pt-cv-tax-api-security'>API security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/application-security\/' title='Application Security' class='pt-cv-tax-application-security'>Application Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-research\/' title='Security Research' class='pt-cv-tax-security-research'>Security Research<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Discover the alarming state of API security in Fortune 1000 and CAC 40. Escape's latest research reveals 2k high-risk vulnerabilities ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Escape - The API Security Blog&feed_id=1020&blog_url=https:\/\/escape.tech\/blog\/\">Escape - The API Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036989\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/imperva-and-the-secure-by-design-pledge-a-commitment-to-cybersecurity-excellence\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/imperva-and-the-secure-by-design-pledge-a-commitment-to-cybersecurity-excellence\/\" class=\"_self cvplbd\" target=\"_self\" >Imperva and the Secure by Design Pledge: A Commitment to Cybersecurity Excellence<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/michael-wright\/\" rel=\"author\">Michael Wright<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T16:45:22-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/application-security\/' title='Application Security' class='pt-cv-tax-application-security'>Application Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cisa\/' title='cisa' class='pt-cv-tax-cisa'>cisa<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/imperva\/' title='imperva' class='pt-cv-tax-imperva'>imperva<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/thales\/' title='thales' class='pt-cv-tax-thales'>thales<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">The Cybersecurity and Infrastructure Security Agency (CISA) has introduced a voluntary \u201cSecure by Design Pledge\u201d for enterprise software manufacturers, focusing on improving the security of their products and services. This pledge outlines ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Blog&feed_id=522&blog_url=https:\/\/www.imperva.com\/blog\/\">Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036836\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cloud-pentesting-101-what-to-expect-from-a-cloud-penetration-test-2\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Cloud Pentesting 101: What to Expect from a Cloud Penetration Test\" title=\"\" data-cvpsrc=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXdY-Fqs48KDom_yFp3LOEH0urSX67K-y9XOu32CrC7iVhxOvRM1akpCT0ohX-NdeOOYtiAtjPVl7511oYXc9Kj5OEcX5Kp3jmjuFLAA9IU1q1f1jVQdwFxRSfR_s-ujNYjLpJIrBA?key=XVSZsT53EE83d9aMwpPUdSZz\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cloud-pentesting-101-what-to-expect-from-a-cloud-penetration-test-2\/\" class=\"_self cvplbd\" target=\"_self\" >Cloud Pentesting 101: What to Expect from a Cloud Penetration Test<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/likhil-chekuri\/\" rel=\"author\">Likhil Chekuri<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-18T08:01:05-05:00\">November 18, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cloud-pentesting\/' title='Cloud Pentesting' class='pt-cv-tax-cloud-pentesting'>Cloud Pentesting<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cloud-security\/' title='Cloud Security' class='pt-cv-tax-cloud-security'>Cloud Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/penetration-testing\/' title='Penetration Testing' class='pt-cv-tax-penetration-testing'>Penetration Testing<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Hold on, let\u2019s guess.\u00a0 You\u2019ve moved a ton of your business to the cloud \u2013 storage, applications, the whole nine yards. Cloud computing offers flexibility, scalability, and a bunch of... The post ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Strobes Security&feed_id=1023&blog_url=https:\/\/strobes.co\/\">Strobes Security<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354122\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"9ea65a06d03a1a58630ddf790d9b771a\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-4e297505qr\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Application Security<\/p>\n","protected":false},"author":6042,"featured_media":1602719,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1354122","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Application Security - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Latest updates on how to improve the security of an application often by finding, fixing and preventing security vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/application-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Security\" \/>\n<meta property=\"og:description\" content=\"Application Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/application-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-22T12:22:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"739\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/application-security\/\",\"url\":\"https:\/\/securityboulevard.com\/application-security\/\",\"name\":\"Application Security - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/application-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/application-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg\",\"datePublished\":\"2017-07-02T19:37:43+00:00\",\"dateModified\":\"2018-07-22T12:22:05+00:00\",\"description\":\"Latest updates on how to improve the security of an application often by finding, fixing and preventing security vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/application-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/application-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/application-security\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg\",\"width\":739,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/application-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Application Security - Security Boulevard","description":"Latest updates on how to improve the security of an application often by finding, fixing and preventing security vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/application-security\/","og_locale":"en_US","og_type":"article","og_title":"Application Security","og_description":"Application Security","og_url":"https:\/\/securityboulevard.com\/application-security\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-07-22T12:22:05+00:00","og_image":[{"width":739,"height":200,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/application-security\/","url":"https:\/\/securityboulevard.com\/application-security\/","name":"Application Security - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/application-security\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/application-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg","datePublished":"2017-07-02T19:37:43+00:00","dateModified":"2018-07-22T12:22:05+00:00","description":"Latest updates on how to improve the security of an application often by finding, fixing and preventing security vulnerabilities.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/application-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/application-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/application-security\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto39874704-2.jpg","width":739,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/application-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"Application Security"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-5GgG","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1354122"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354122\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1602719"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1354122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}