UncategorizedA New Book to Learn About Application Security

Blog

February 22, 2021 Timothy Chiu, VP of Marketing
A New Book to Learn About Application Security

If you’re just starting out as an application developer or you’re a seasoned developer looking for a good review guide, there’s a new book from Wiley titled “Alice and Bob Learn Application Security” to assist with learning about the fundamentals of application security.

Application security is more important than ever with more vulnerabilities than ever being released to production in application code, the increasing number of attacks on web applications, including zero day attacks.

Attacks on applications are the number one reason for data breaches, so ensuring applications make it to production with the least number of vulnerabilities possible is essential.

The book has three major parts.  The first part covers writing code while taking security into account, including the topics of secure design, secure code, testing and release. The second part of the book focuses on testing and deployment, essential parts of the application development process to ensuring application security. The last part of the book  provides tips to the developer on how to continue to keep good habits and build knowledge.

If you’re wondering about the title, “Alice and Bob learn Application Security”, it’s because the book’s examples are described through the fictional characters of Alice and Bob, using them to explain issues and solutions.

This new book from Wiley may be just the thing you’re looking for if you’re a developer looking to get started with Application Security.


Here at K2 Cyber Security, we’d like to help out with your Application Security requirements.  K2 offers an ideal runtime protection security solution that detects true zero-day attacks, while at the same time generates the least false positives and alerts.  Rather than rely on technologies like signatures, heuristics, fuzzy logic, machine learning or AI, we use a deterministic approach to detect true zero-day attacks, without being limited to detecting attacks based on prior attack knowledge.  Deterministic security uses application execution validation, and verifies the API calls are functioning the way the code intended.  There is no use of any prior knowledge about an attack or the underlying vulnerability, which gives our approach the true ability to detect new zero-day attacks. Our technology has 8 patents granted/pending, and has no false alerts.

K2’s technology can also be used with DAST testing tools to provide IAST results during penetration and vulnerability testing.  We’ve also recently published a video, The Need for Deterministic Security.  The video explains why the technologies used in today’s security tools, including web application firewalls (WAFs) fail to prevent zero day attacks and how deterministic security fills the need for detecting zero day attacks.  The video covers why technologies like artificial intelligence, machine learning, heuristics, fuzzy logic, pattern and signature matching fail to detect true zero day attacks, giving very specific examples of attacks where these technologies work, and where  they fail to detect an attack.

The video also explains why deterministic security works against true zero day attacks and how K2 uses deterministic security.  Watch the video now.

Change how you protect your applications, include RASP and check out K2’s application workload security.

Find out more about K2 today by requesting a demo, or get your free trial.

 

 

Share this

Leave a Reply

Your email address will not be published. Required fields are marked *

K2 CYBER SECURITY

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memory-based attacks, and provides additional vulnerability detection. K2’s Platform is deployed on production servers for runtime protection of applications and on pen-testing/pre-production servers to identify the location of the vulnerable code in real-time. K2’s solution generates almost no false alerts, eliminates breaches due to zero-day attacks, detects attacks missed by traditional security tools including Web Application Firewalls, and dramatically reduces security cost. K2 Cyber Security is located in the USA, and provides cyber security solutions globally.

CONTACT INFO

K2 Cyber Security, Inc.

2580 N. First Street, #130

San Jose, CA 95131