Application Security
Workshop “How to write custom security tests” – Main Takeaways
Discover the main takeaways from our latest workshop on how to write custom security tests for API security ...
Why security engineers need a new approach to identify business logic flaws
Learn why security engineers need a new approach to identify business logic flaws ...
Sentry, GitHub Use AI to Help Fix Coding Errors
Developers are getting more help detecting and addressing bugs in their code through new AI-based tools that Sentry.io and GitHub each introduced this week. Sentry unveiled the beta of Autofix, a feature ...
The art and science of product security: A deep dive with Jacob Salassi
Discover the main takeaways from our conversation on product security with Jacob Salassi, Director of Product Security at Snowflake ...
Ordr Taps AI to Augment Attack Surface Management
Ordr this week added an attack surface management (ASM) tool infused with artificial intelligence (AI) to its existing asset management portfolio ...
Bridging the Gap: Integrating SOCs into Application Security for Enhanced Cyber Resilience
Historically, Security Operations Centers (SOCs) and Application Security (AppSec) programs have operated as distinct entities within the broader cybersecurity framework of an organization. SOCs have been the stronghold of real-time threat detection, ...
EPA and White House Raise Alarm on Water Cybersecurity
Iran and China fingered: Biden admin. chides governors: Water infra. lacks “even basic cybersecurity precautions.” ...
Navigating the NSA’s New Zero-Trust Guidelines
New guidelines from the NSA provide public sector and private organizations with the necessary framework to approach zero-trust ...
French Gov. Leaks 43 Million People’s Data — ‘France Travail’ Says Sorry
La grande cybermalveillance: French government’s employment agency loses control of citizens’ data after biggest breach in Gallic history ...
Best Practices for Securing Microsoft Copilot
Microsoft's Copilot is becoming a focal point for businesses seeking to revolutionize their operations and elevate productivity. Here's how to secure it ...