Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security

The latest News and Information on Application Security including monitoring, testing, and open source.

15 Web Application Security Best Practices

Every day that an application is anything less than ‘fully secure’ is a day for a potential data breach. Consumer data, sensitive business information, monetary transactions, and business reputation; everything is at stake. Investing in effective web application security is the best and only way to mitigate the risk of financial losses and reputational damage for businesses. This blog presents a comprehensive blueprint for implementing best practices in application security.

Six takeaways from our ASPM masterclass series

Software development moves fast, and many application security teams struggle to keep up. More sophisticated agile, DevOps, and cloud practices, along with the growing use of AI, mean more agility for development teams. However, these innovations are a challenge for security teams, as they must move at this same speed in order to secure applications effectively. Application security posture management (ASPM) directly responds to these emerging challenges.

Security at the Speed of Cloud

Cloud native technologies have empowered engineering teams to innovate rapidly: from releasing a few times a year to several times a day. This means security assessment have to be done continuously. To achieve this, developer, operation, and security teams have to collaborate in novel ways. Instead of communicating through backlogs, they need to work towards shared objectives. From processes to tooling, teams have to rethink the way they approach security, share context, and improve the security posture of their organization.

Mitigate Upstream Risk in your Software with Black Duck Supply Chain Edition | Synopsys

In this video, we introduce the new Black Duck Supply Chain Edition, which provides a full range of supply chain security capabilities to teams responsible for building secure, compliant applications. With third-party SBOM import and analysis, malware detection, and export options in SPDX or CycloneDX formats, teams can establish complete supply chain visibility, identify and mitigate risk, and align with customer and industry requirements.

What is ASPM - Application Security Posture Management Defined

Welcome to our concise video on ASPM – Application Security Posture Management! In this brief 1-minute video, we unravel the complexities surrounding ASPM, shedding light on its crucial role in safeguarding digital assets and data integrity. ASPM serves as a comprehensive framework for assessing, monitoring, and enhancing the security posture of applications throughout their lifecycle. From development to deployment and beyond, ASPM empowers organizations to proactively identify and mitigate security risks, vulnerabilities, and compliance gaps.

Webhook security checklist: How to build secure webhooks

Let’s not waste time. You’re here because you’re building a webhook feature in your app. Unfortunately, there are quite a few things that can go wrong from a security perspective. This article aims to ensure that you’re not making any well-known mistakes while building webhooks.

Cloud Unfiltered with Travis Runty - Cloud Native Trends - Episode 7

Welcome to this exciting edition of Cloud Unfiltered, where your host Michael Chenetz, delves into the intricate world of cloud computing with special guest Travis Runty, the CTO of Public Cloud at Rackspace. With almost 17 years of experience at Rackspace, Travis brings a wealth of knowledge from his journey as an engineer, architect, and delivery lead, to leading public cloud strategy.

Panoptica: Cloud application security done better

Panoptica, Cisco’s cloud native application security platform provides contextualized cloud security to identify, prioritize, and remediate security risks and misconfigurations in complex cloud environments. The unified cloud security platform makes every stage of cloud security simple from “code to cloud,” providing software supply chain protection, cloud workload and runtime protection, cloud security posture management (CSPM), security for API communication to and between your microservices, and cloud detection and response (CDR) for realtime security protection.

This Month in Datadog: DASH 2024 preview, Datadog Security for Google Cloud, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. To learn more about Datadog and start a free 14-day trial, visit Cloud Monitoring as a Service | Datadog. This month, our Spotlight is a preview of our annual conference, DASH 2024.

Walking the Risky Path: The Threat of hostPath to Your Kubernetes Cluster

In today's cloud technology landscape, Kubernetes is widely used to orchestrate containerized applications, enabling deployment, scaling, and management. Applications in a Kubernetes environment benefit from high availability and resource efficiency, making them ideal for cloud-native development. However, challenges with filesystem consistency due to the ephemeral nature of containers can lead to discrepancies when they are restarted or modified.