ZeroNorth

2015
Boston, MA, USA
May 14, 2020   |  By ZeroNorth
You know the story. Software is running the world, which means everyone who is developing and delivering it must work towards making sure it’s secure. And this effort most certainly includes standing up, managing and executing a vulnerability management program across applications and infrastructure. Sounds great—but at what cost? To figure this out, you’ll need to think beyond the software licensing and annual support costs.
May 12, 2020   |  By Joanne Godfrey
There’s no greater validation of the ZeroNorth platform than objective reviews from leading publications in the security industry. And we now have two of them—from CSO Magazine and SC Magazine! Both reviews recognize the value of ZeroNorth’s platform as a solution for managing risk and vulnerabilities throughout the software development lifecycle (SDLC).
May 7, 2020   |  By ZeroNorth
The business world uses a lot of confusing terminology, and cybersecurity is no exception. Many buzzwords and catchphrases, while annoying, are harmless. But there is also terminology whose misapplication is problematic. Application security (AppSec) and information security (InfoSec) are two terms that are often conflated. Sure, there’s plenty of crossover between these disciplines, and there’s certainly a point of convergence, but they are different.
May 6, 2020   |  By ZeroNorth
Cybersecurity Industry Veteran to Support Company's Continued Growth
Apr 29, 2020   |  By ZeroNorth
Happy Birthday! Exactly one year ago, the ZeroNorth brand was born as the industry’s first provider of risk-based vulnerability orchestration across applications and infrastructure. Building on the foundation of technology innovation developed over several years, ZeroNorth set out on a path to reinvent the way companies think about vulnerability management and application security. In the midst of everything going on, why does this matter?
May 5, 2020   |  By ZeroNorth
For digital transformation initiatives to be successful, rapid development and delivery of software capabilities is crucial. This paper highlights the time needed to support the comparison, selection, deployment, and on-going management of the tools and techniques inherent to a comprehensive vulnerability management program, across applications and infrastructure, as they will significantly impact the TCO of that program.
May 5, 2020   |  By ZeroNorth
Application security is usually done by finding, fixing and preventing vulnerabilities, with an emphasis on finding solutions to prevent cybersecurity events in the future. As technology advances-and more rapidly than ever-how will the next generation of AppSec address these new challenges?
May 1, 2020   |  By ZeroNorth
From security threats to compliance regulations to the unrelenting pace of business, staying conscious of cybersecurity risks in 2020 is shaping up to be a full-time job. Around this time of year, experts love to offer up their predictions about what's on the digital horizon and how we can best prepare ourselves for the inevitable future. Whether or not these apocalyptic cybersecurity situations come to fruition remains to be seen, but one thing's for sure-it will be a year to watch.
May 1, 2020   |  By ZeroNorth
Stop treading water and simplify the management and remediation of your software vulnerabilities. This eBook discusses challenges with current approaches, the differences between automation and orchestration and the steps to get started with orchestration.
Apr 1, 2020   |  By ZeroNorth
Virtually every business in the world relies on software to keep their competitive edge. At the same time, application vulnerabilities are escalating, and data breaches-how to prevent, plan and recover from them-are common C-suite conversations. This paper discusses how a risk-based approach to vulnerability orchestration across applications and infrastructure empowers organizations to critically assess their security with real data, bringing them closer to truly secure DevOps with well-aligned security, operations and development teams.
Apr 28, 2020   |  By ZeroNorth
ZeroNorth celebrates its first birthday.
Apr 8, 2020   |  By ZeroNorth
Establishing an application security program is an ongoing process – there are always steps you can take to improve your program. Join Veracode CTO, Chris Wysopal, Bugcrowd CTO, Casey Ellis, ZeroNorth CTO, John Steven and Optiv Director of Threat Management, Luis Jimenez for a one-hour panel discussion on best practices for maturing your AppSec program. And, if you’re just starting your AppSec journey, our experts will also be providing some practical first steps you can take that will prepare your AppSec program for improvements in the future.
Mar 22, 2020   |  By ZeroNorth
ZeroNorth CEO Interview at RSA Conference 2020
Feb 20, 2020   |  By ZeroNorth
Learn how you can solve three key application security challenges with the ZeroNorth platform.
Jan 9, 2020   |  By ZeroNorth
Learn how ZeroNorth's risk-based vulnerability orchestration platform can help you better compete in today's software-defined world.