Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security

The latest News and Information on Application Security including monitoring, testing, and open source.

The Application Security Assessment Checklist for Cloud Native Environments

A cloud-based application security assessment (or ASA) is a systematic evaluation to identify vulnerabilities and improve security in cloud applications. It aims to ensure the application’s structural, design, and operational integrity against all cyber threats. A staggering 82% of data breaches in 2023 involved data stored in the cloud.

kntrl integrates Open Policy Agent

Addressing the security intricacies of sophisticated automation frameworks, in our case the Continuous Integration/Continuous Deployment (CI/CD) environments, is always challenging. The inherent complexity of such environments, characterized by the multitude of components that are each performing distinct tasks, necessitates a dynamic and adaptable rule engine to ensure the security of our pipelines.

Outshift by Cisco | An Era of GenAI & Human Collaboration

AI is the key to unlocking the untapped potential within your organization. At Outshift, we invest in the future of GenAI, not as a tool that replaces human effort but as a transformative force that amplifies the creativity and ingenuity of people across your enterprise. We invite you to reimagine the role of GenAI in business. Thinking of it as a tool for connection, adaptation, and creativity - a tool with unprecedented efficiency and impact.

Accelerating AppSec with Mend.io and Sysdig

Today at RSA Conference 2024, Mend.io and Sysdig unveiled a joint solution targeted at helping developers, DevOps, and security teams accelerate secure software delivery from development to deployment. The integration incorporates the exchange of runtime insights and application ownership context between Sysdig Secure and Mend Container to provide users with superior, end-to-end, and risk-based vulnerability prioritization and remediation across development and production environments.

Shift left: How securing from code to cloud can improve your time to market

Embracing a shift-left security approach in software development will not only enhance your application security but will also accelerate your software product's time to market. By integrating security practices early in the software development lifecycle (SDLC)—particularly in your cloud-native applications—you can navigate modern cyber threats more effectively as you get to market more swiftly.

Smart Cloud Detection and Response: Detecting attacks in real-time with Panoptica

Modern technology continues to assist, enhance, and shape every aspect of our lives—in our work, our homes, and even our vehicles. Home security video cameras and car dashcams are prevalent ways to ensure our personal safety and security. A popular electric vehicle has a “sentry mode” that is a perfect example of a system that monitors and captures events happening around the vehicle, providing information about incidents to vehicle owners.

Elevate, Automate, Anticipate: Panoptica's Cutting-Edge Security Solutions Unveiled at RSAC

The RSA Conference 2024 was a landmark event for Panoptica as we unveiled three transformative solutions: Smart CDR, GenAI Dynamic Remediation, and Security Graph Query. These tools work together seamlessly to strengthen your security architecture and ensure readiness against today's complex and evolving threats. Let’s take a look at each of these exciting new capabilities.

Generative AI & Security - Cisco Research Summit Spotlights the Latest in GenAI

Cisco Research hosted a virtual summit to explore current research in the generative AI and cybersecurity space. The session includes presentations from University professors collaborating with the Cisco Research team, including Srini Devadas (MIT), Vijayalakshmi Atluri (Rutgers), Jie Ding (Minnesota), and Ravi Sandhu and Ram Krishnan (UT San Antonio). Listen in for unique and exciting perspectives on the possibilities of generative AI in security, including discussions on the trustworthiness of LLMs, training and maintenance of AI models, and more.