Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Webhook security checklist: How to build secure webhooks

Let’s not waste time. You’re here because you’re building a webhook feature in your app. Unfortunately, there are quite a few things that can go wrong from a security perspective. This article aims to ensure that you’re not making any well-known mistakes while building webhooks.

Walking the Risky Path: The Threat of hostPath to Your Kubernetes Cluster

In today's cloud technology landscape, Kubernetes is widely used to orchestrate containerized applications, enabling deployment, scaling, and management. Applications in a Kubernetes environment benefit from high availability and resource efficiency, making them ideal for cloud-native development. However, challenges with filesystem consistency due to the ephemeral nature of containers can lead to discrepancies when they are restarted or modified.

Securing CI/CD Runners through eBPF

During the Open Security Summit 2024, Yahoo! Principal Security Engineer Mert Coskuner and Kondukto CEO & Co-Founder Cenk Kalpakoglu delved into the intriguing topic of securing CI Runners through eBPF agents. Although the title might seem unconventional, it reflects their creative approach to solving security challenges in continuous integration environments. With the rapid digital transformation of businesses, there has been an increasing focus on supply chain attacks and their impact on security.

GenAI Attack Path Remediations for Panoptica

Generative AI technology is rapidly evolving, offering groundbreaking capabilities in various fields, including cloud native environments and CNAPP (Cloud-Native Application) solutions. Development of generative AI technology holds immense promise for enhancing the capabilities and performance of cloud-native environments and CNAPP solutions.

Choosing the Best Mobile Application Security Testing Tool in 2024

As per Statista, mobile apps are estimated to generate over $935 billion in revenue in 2024, which includes: This means businesses must prioritize mobile app testing and security posture to safeguard users' personal and financial information from security breaches. For successful mobile app testing, your team must test the app through numerous operating system versions, network bandwidths, screen resolutions, and devices—to ensure the app performs seamlessly across devices.

Why Visma chose Aikido Security for its 170+ companies

Visma selects Aikido security, entrusting them to deliver software security to their portfolio of 170+ companies. Securing software is vitally important to Visma, whose operations deliver software to dynamic SMEs, powerhouse corporations, and key public institutions worldwide. Together, Visma and Aikido are not just participating in the future of application security; they are creating it.

What is DSPM and why is it an essential component in cloud-native security solutions?

In the rapidly advancing realm of cloud-native security, Data Security Posture Management (DSPM) emerges as a critical framework, ensuring organizations maintain robust control over their data assets. As cloud environments evolve, understanding and implementing DSPM becomes vital for better securing data defenses. In this blog post, we'll delve into the basics of DSPM, its significance in cloud-native security and how Panoptica approaches DSPM within its CNAPP solution.

The Imperative Need for Consolidation in Web App Security and Delivery

In today’s rapidly evolving digital and cyber landscape, securing and delivering applications efficiently is crucial for businesses of all sizes. The pursuit of uninterrupted service is no longer the only focus. Security concerns have taken center stage, transforming the landscape into a battleground where the slightest disruption triggers a search for root causes and solutions. When websites falter, application owners navigate a maze of possibilities.

The 7 Essential Components for ASPM (Application Security Posture Management)

As attack vectors expand due to architectural changes, such as distributed cloud deployment, APIs, and multiple access mechanisms, modern apps are under increasing threat. Additionally, with an ever-growing feature set, rapid release cycles, and dependency on third-party libraries, security is impacted at every application stage of the SDLC. Application-layer attacks have spiked by as much as 80% in 2023.

Snyk's AppSec dream team

With springtime just around the corner, there’s a lot to be excited about — warmer weather, longer days, and, most importantly, basketball! In honor of the upcoming March Madness tournament, we’ve put together our own dream team for AppSec. Read on to discover the all-star features in application security this year and how they can help your team get a slam dunk in protecting applications from code to cloud.