Syndicated Blog

K2io
Runtime Apllication Workload Protection

SAST vs DAST vs IAST

I would think most would agree that it wouldn’t be too much of a stretch to draw the parallel between security tools and medicines and threats as diseases which brings us to ...
The Need for Deterministic Security

More than 40 billion records exposed in 2021

Security Brief Asia is reporting on new research showing more than 40 billion records were exposed by data breaches in 2021. According to the research from Tenable's Security Response Teams, they found ...
The Need for Deterministic Security

A Quick Look at the New OWASP Top 10 for 2021

Back in September of 2021 we wrote that the OWASP working group had a draft of latest Top 10 Web Application Security Risks, their first update since the 2017 revision.  The working ...
The Final Count: Vulnerabilities Up Almost 10% in 2021

The Final Count: Vulnerabilities Up Almost 10% in 2021

ow that 2021 has ended, we can see the final tally of vulnerabilities recorded for 2021.  The year ended with a total of 20,061 vulnerabilities recorded, 9.3% over the prior year and ...
The Need for Deterministic Security

93% of Tested Networks Vulnerable to Breach

Nearly every organization can be infiltrated by cyber attackers, based on data from dozens of penetration tests and security assessments. The vast majority of businesses can be compromised within a month by ...
K2 can protect against Log4J without patching

K2 can protect against Log4J without patching

The Log4J vulnerability has been given a CVSS Score of 10, making it the most serious of discovered flaws. VentureBeat is reporting that Log4J attacks have been attempted on 44% of corporate networks. Find out how to protect against Log4J attacks. The post ...
Runtime Application Security: Made to Protect Against LOG4J2 Attacks

Runtime Application Security: Made to Protect Against LOG4J2 Attacks

A recently discovered vulnerability in LOG4J2 (also referred to as LOG4SHELL) is being widely reported as one of the most dangerous vulnerabilities in application software to date. There is already news that ...
Can Your IAST Do This?

Can Your IAST Do This?

While Interactive Application Security Testing (IAST) is still a relatively new technology from the perspective of adoption, it has been around for over 10 years and some of the aspects and capabilities around IAST are well understood, such as ...
Fifth Record Year in a Row for Vulnerabilities

Fifth Record Year in a Row for Vulnerabilities

On December 8, 2021 we just hit another milestone with the number of vulnerabilities recorded in the US CERT Vulnerability Database (so far in 2021) exceeding the total count in 2020, marking ...
Cyber Security Predictions for 2022

Cyber Security Predictions for 2022

As we approach the end of 2021, we’d like to present our predictions for 2022 for the application security community.  It would be easy to just predict that cyber attacks will continue ...