Aspect Security Announces Application Security eLearning Version 3.0

Section 508 Compliant, Specialized Role-Based Learning Tracks, Mobile Enabled

COLUMBIA, MD--(Marketwired - Dec 3, 2014) - Aspect Security, a pioneer in application security, announced version 3.0 of their award-winning eLearning for Secure Application Development. Already OWASP Top Ten 2013, PCI/DSS, SANS 25, HIPAA and SOX compliant, version 3.0 contains major updates, including Section 508 compliance for use in government agencies and their contractors, HTML5 programming so content can be accessed from tablets and mobile devices, four additional application security topics to meet today's complex threat-scape, and customized, role-based learning tracks that provide information for specialized roles and responsibilities.

Expert Roundtable: The Future of Security Education

Read more of the advice HP's Jacob West, Digital Management's Rick Doten, and Aspect Security's Jeff Williams discuss different aspects of application security, university programming and development programs, and where the industry is going. 

The 2014 State of Developer Application Security Knowledge Report

Aspect Security Analyzes Gaps in Developers’ Application Security Knowledge
2014 State of Developer Application Security Knowledge Report

Columbia, MD, September 15, 2014– Aspect Security, a pioneer in application security, today announced their findings of developers’ knowledge of application security principles. The 2014 State of Developer Application Security Knowledge Report details the top areas of expertise and those critical areas that require strengthening.  Data for the study came from results culled from more than 1,400 developers from 695 organizations worldwide who participated in Secure Coder Analytics, a free online assessment tool created by Aspect Security. A 20-question randomized quiz, Secure Coder Analytics arms organizations with an accurate assessment of their development team's knowledge of application security.  Participants represented diverse industries including: financial services, banking, e-commerce, retail and the federal sector.

Another breach like Target’s is inevitable, security expert tells Consumer Reports

Major security lapses that a Senate report highlighted are widespread

Expect more data breaches as large and severe as the Target breach.

That’s the takeaway from our exclusive interview with a security expert Jeff Williams. The types of security missteps a Senate Committee recently cited in analyzing the Target incident are found in many organizations, he said. “The problem isn’t really Target,” he said. “The problem is systemic. This could have been anybody.”

CIOReview Names Aspect Security to its Top Twenty List

CIOReview put together a panel of CIOs and CEOs of public companies, analysts, and the CIOReview editorial board to finalize their list of the 20 Most Promising Enterprise Security Consulting Companies. We are honored:

PRESS RELEASE: Aspect Announces new CEO

John Pavone SELECTED AS Aspect Security’s CEO

Columbia. MD – April 8, 2014 – Aspect Security, the Application Security Experts, today announced that John Pavone, has been selected by the Board of Directors to lead the company as its CEO. The former CEO, Jeff Williams, will continue as the CTO of Aspect, and will also become the CTO of a startup, Contrast Security. Contrast Security is a new company formed to bring to market Contrast, a revolutionary application security technology developed in Aspect’s research labs that provides continuous application security monitoring to development and security teams.

7 Essential Questions to Ask When Hiring an IT Security Consultant

The increasing skill and audacity of cyber criminals poses a threat to all business owners. Massive breaches at huge firms such as Target may score all the headlines, but if you think hackers are only interested in big business, think again. According to a 2013 Symantec report, 31 percent of targeted attacks were aimed at businesses with fewer than 250 employees—three times the amount in 2012. Meanwhile, the cost of a breach can rapidly reach hundreds of thousands, if not millions, of dollars.