Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Enhancing Code Security with Generative AI: Using Veracode Fix to Secure Code Generated by ChatGPT

Artificial Intelligence (AI) and companion coding can help developers write software faster than ever. However, as companies look to adopt AI-powered companion coding, they must be aware of the strengths and limitations of different approaches – especially regarding code security. Watch this 4-minute video to see a developer generate insecure code with ChatGPT, find the flaw with static analysis, and secure it with Veracode Fix to quickly develop a function without writing any code.

What is API Runtime Protection?

API runtime protection is the process of securing APIs as they operate and manage requests during their normal functioning. Blocking runtime API threats requires an understanding of the context of operations for each individual API, including API access, usage, and behavior. In addition, runtime protection should log API traffic, monitor sensitive data access, detect threats, and block or remediate attack vectors.

AI can crack your passwords. Here's how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques aren’t new, they’re becoming more sophisticated and posing a serious threat to your sensitive data. Thankfully, password managers like Keeper Security exist and can help you stay safe from AI-password threats.

What is API Discovery?

In order to protect your entire API estate—and your business—you need to be able to discover all APIs in use of every type using automated processes. It’s essential to know which APIs you have exposed at all times—this is sometimes called an inside-out approach to API discovery. However, it has also become critical to discover potential attack vectors that make APIs vulnerable using an outside-in approach.

What is a Web Application Firewall (WAF)?

A web application firewall, better known as a WAF, is a security device designed to protect organizations at the application level. WAFs achieve this goal by monitoring, filtering, and analyzing traffic between the internet and a web application. Acting as a reverse proxy, the purpose of a common web application firewall is to shield applications from malicious requests.

Defender for IoT's Firmware Analysis Tool is Exceptional

One of my "pastimes," if you will, is to check out the features of various security tools. I had been curious about Microsoft's Defender for IoT's just-released Firmware Analysis feature. Essentially, I wanted to test its capabilities because, as we all know, adversaries are continuously upping their game making tools like this increasingly important when it comes to maintaining an organization's security.

What is API Management?

Application programming interfaces, or APIs, connect software applications and data sources to one another. Given the breadth of their reach, it’s wise for organizations to engage in proactive API management, which keeps APIs running reliably and securely. API management incorporates many different tasks and processes. It spans API creation and API publishing and continues through the full API lifecycle through retirement. API management also involves monitoring APIs for performance and adherence to service level agreements, or SLAs.

What is penetration testing?

Penetration testing (or pen testing for short) involves performing simulated, fully authorized attacks on a company’s IT infrastructure and network. These attacks seek to exploit the system’s security loopholes. The objective of the tests is to assess the system’s robustness and preparedness against different types of breaches and glean lessons and insights that ultimately serve to strengthen its security even further.

5-Step Guide on Securing Serverless Architectures in the Cloud with RASP

Serverless architecture has increased in recent years, and is anticipated to grow by nearly 25% over the next decade, According to one source, the serverless architecture market was worth over $9 billion in 2022, with its compound annual growth rate projected to increase. The market could be worth over $90 billion by 2032. This indicates the immense amount of potential that this industry carries, influenced by the increasing adoption of DevOps by organizations.

Penetration Testing in AWS: Can You Test Your Cloud Security?

AWS Security provides organisations with the tools and resources they need to protect their applications, services and data in the cloud. It can help businesses identify areas of vulnerability, detect malicious activity, monitor traffic patterns for suspicious activity and prevent unauthorised access. It includes features like encryption, authentication, risk assessment and compliance monitoring.