<img height="1" width="1" style="display:none;" alt="" src="https://analytics.twitter.com/i/adsct?txn_id=nv7vl&amp;p_id=Twitter&amp;tw_sale_amount=0&amp;tw_order_quantity=0"> <img height="1" width="1" style="display:none;" alt="" src="//t.co/i/adsct?txn_id=nv7vl&amp;p_id=Twitter&amp;tw_sale_amount=0&amp;tw_order_quantity=0">

Web Application Security Blog

Richard April

A metrics-driven, hands-on leader with the ability to turn strategic initiative into positive business impact, Richard April is the CMO at IMMUNIO. With more than two decades of software marketing experience, including in the security and enterprise spaces, Richard has an supreme ability to grow brand awareness, drive leads and leverage alliance opportunities effectively and efficiently. Prior to joining IMMUNIO, Richard leveraged his early adoption of Inbound Marketing and expertise in traditional outbound marketing as SVP of Marketing at Repsly and before that as SVP of Marketing at AG Salesworks. Richard was also instrumental in the launch of Copiun, a secure mobile file sharing and data management solution provider acquired by Good Technologies, and led marketing efforts at security software providers Cyber-Ark (NASDAQ: CYBR) and Quarry Technologies (acquired by NexTone).
Find me on:

Recent Posts

Improve Productivity Across Your Organization with RASP

POSTED BY  Richard April on Feb 09, 2017
Feb 09 2017

Every innovation today revolves around streamlining. We seek the fastest way to get from point A to point B, the fastest way to shop, pay, interact with each other and with other devices, etc. People simply do not have the time to spend that they...

Continue Reading ›

TOPICS     RASP

Why Signature Based Security is Only the First Step

POSTED BY  Richard April on Feb 07, 2017
Feb 07 2017

Think of the security infrastructure of your application as its doctor. When working properly, it diagnoses threats to your system and prescribes the right course of action to keep that threat from infecting your application - much the way your...

Continue Reading ›

TOPICS     AppSec Tools  WAF vs. RASP

Ready to be Hacked: Incident Response

POSTED BY  Richard April on Jan 31, 2017
Jan 31 2017

As any security professional knows, the threat landscape is a moving target. Right now, hackers seem to be choosing web applications as a favored way into enterprise information systems—Verizon reports that they represent 40% of all confirmed...

Continue Reading ›

TOPICS     Application Security

2016: AppSec Year in Review

POSTED BY  Richard April on Dec 15, 2016
Dec 15 2016

Accounts taken over and credentials seriously stuffed

Credential stuffing attacks were made possible by several hacks that hit the news in 2016. Hacks like these happen in two (or more) phases, often occurring years apart. The first phase is...

Continue Reading ›

TOPICS     Vulnerabilities  Application Security  Account Takeover  Stolen Credentials

Going Beyond WAFs: Targeted, Accurate, Real-Time Application Protection

POSTED BY  Richard April on Oct 18, 2016
Oct 18 2016

New threats to web applications are emerging all the time. Your organization’s defenses need to keep pace with these new threats. Organizations that rely primarily on Web Application Firewalls (WAFs) to safeguard against common application...

Continue Reading ›

TOPICS     Application Security  AppSec Tools  WAF vs. RASP

Reducing the Security Threat from Legacy Apps

POSTED BY  Richard April on Aug 16, 2016
Aug 16 2016

Even in organizations that continually build new applications, legacy code frequently persists in the code base, often for months or even years. Inevitably, much of this code either originated outside the organization or was written by developers...

Continue Reading ›

TOPICS     Vulnerabilities  Application Security

Vulnerabilities Old and New Dominate the News this Week

POSTED BY  Richard April on Aug 04, 2016
Aug 04 2016

When it comes to application vulnerabilities, everything old is new again -- or so it seems from this week’s headlines. It’s an eventful time for the software security industry, with Black Hat USA 2016 going on in Las Vegas this week. It seems...

Continue Reading ›

TOPICS     Vulnerabilities  Account Takeover  Stolen Credentials