Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security

The latest News and Information on Application Security including monitoring, testing, and open source.

Why is Software Vulnerability Patching Crucial for Your Software and Application Security?

Software vulnerability patching plays a critical role in safeguarding your code base, software, applications, computer systems, and networks against potential threats, and ensuring they’re compliant, and optimized for efficiency. Organizations’ codebases have become increasingly complex, involving sophisticated relationships between components and their dependencies.

Choosing the Right Managed Application Security Provider: A Guide

Imagine, if you will, that you are the esteemed ruler of a vast digital dominion, and your applications are the lifeblood of your realm. Yet, in the boundless expanse of cyberspace, there lurk dragons of the most fearsome kind—cyber threats, data breaches, and hackers. You require a champion, a Managed Application Security Provider (MASP), to safeguard your kingdom. But how, pray tell, does one select the right one?

LLMs Need Security Too

In this episode Jb and Izar are joined by David Haber, CEO of Lakera, who focuses on securing LLMs and their use. We explore topics like prompt injection and their impact on security, safety and trust, and we look at the Gandalf experiment ran by Lakera. We touch on the recently drafted OWASP Top 10 on LLM project, and have a great discussion on what LLMs are really doing and their potential as tools and targets.

AppSec integrations enable a more secure SDLC

AppSec integrations can help keep development secure at the speed your business requires. Whether you’re building software, selling it, or using it to run your business, in today’s fully digitized environment, every business is, necessarily, a software business. And to keep your business running at the speed today’s competitive environment requires, you increasingly depend on technology.

Consolidation: The wave of the (AST) future

Reducing complexity and providing insight into software risk, consolidation is the wave of the application security testing future. As the convergence of economic and practical factors increases pressure on organizations to streamline their application security (AppSec) initiatives, consolidation is emerging as a practical solution.

The new era of Application Security: Security Building Blocks for Developers

With the proliferation of data breaches and cyber-attacks, developers must take a proactive approach to security. BoxyHQ's Security Building Blocks for Developers are designed to help developers build and deploy secure applications with minimal effort and expertise. In addition to their core products security teams are finding it hard to keep pace with new no-code and low-code apps that are being created in the company.

This Month in Datadog: ASM protection features, Remote Configuration, Workflow Automation, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on Application Security Management’s protection capabilities..

AppSec and Software Supply Chain Security: How Do They Go Together?

AppSec and Software Supply Chain Security are two terms more frequently used as part of DevOps, as well as when considering how to develop a security strategy. Software supply chain attacks are on the rise and organizations must brace for the strong possibility that their software supply chain will be a target–so much so that Gartner has projected that by 2025, supply chain risk management will be a key success driver for more than 50% of organizations.

Container Security Fundamentals - Linux Namespaces (Part 2): The PID Namespace

In this video we continue our examination of Linux namespaces by looking at some details of how the PID namespace can be used to isolate a container’s view of processes running on the host, and how this feature can be used for troubleshooting container problems. To learn more read our blog on Datadog’s Security Labs site.

Cloud Security Lounge: Vulnerability Management the SBOM Way

Vulnerability Management always starts from… a list of vulnerabilities. But where does this list come from? How do you know what software an organization is using? SBOM is a way to describe all this. It’s a data model, a format, used by a broad ecosystem helping manage vulnerabilities and more.