Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OWASP API Cheat Sheet - From Developer Guidance to Executive Strategy

OWASP’s API Security Cheat Sheet is a familiar resource for many cybersecurity leaders—often bookmarked, rarely reimagined. But what if this seemingly developer-focused reference held the blueprint for executive-level strategy? For CISOs and CFOs operating in the era of digital ecosystems and financial APIs, this cheat sheet is not just tactical guidance—it’s strategic armor.

Search-Safe: Why SEO Should Be Part of Your Cybersecurity Toolkit

When most people hear the term "SEO," they think about getting more clicks, climbing up Google's ranks, and squeezing into that coveted top-three spot. It's all very performance-driven-and fair enough. But there's another side to SEO that gets overlooked: security.

Is Runtime Vulnerability Management the future of cyber risk management?

Traditional vulnerability management has hit a wall. The vulnerability management playbook hasn't changed much in decades: scan for CVEs, prioritize by CVSS scores and patch as quickly as possible. But this reactive approach is failing security teams who are drowning in alerts while real threats slip through the cracks. Runtime vulnerability management sets out to change this status quo. Here's what you need to know.

Can Google Jules Build a SECURE Note Taking App?

In this video, I test out Google Jules, Google’s brand new AI developer assistant, to see if it can build a secure note-taking app from scratch. With a focus on privacy, authentication, and data protection, I challenge Jules to create something functional and secure. This is part of an ongoing series where I test different AI models and tools to see how well they handle real-world development tasks. Check out our playlist where we're putting these various models to the test!

SOC 2 Compliance and Vulnerability Scanning: A Complete Guide

With 5+ vulnerabilities being discovered every minute, a SOC 2 (System and Organization Controls 2) compliance certificate demonstrates to customers and partners that the organization is committed to security and adheres to industry best practices for safeguarding data. Apart from customer trust, it can help organizations find and fix security vulnerabilities before attackers can exploit them.

AI Trust in Action: How Snyk Agent Redefines Secure Development

One word defines success or failure in the race to adopt AI in security workflows: trust. While the industry moves fast toward automation and autonomy, adoption often stalls when developers and the teams supporting them can’t trust what the AI delivers. It’s not enough for a tool to explain what it did. Developers want to know: Did it actually fix the problem? Will this change break something else? Can I rely on it again next time? Nowhere is that skepticism more justified than in security.

Pen Testers Save the Day: Exposing Critical Vulnerabilities! #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

A Modern Approach to Managing Vulnerabilities

Organizations today rely on an increasing number of applications installed on enterprise devices just to “keep the lights on” and business functioning. Being able to immediately access emails, files, communications, and web conferencing tools has never been more critical with the rise of remote and hybrid work.

Threat Context Monthly May 2025: Scattered Spider & Lumma Stealer

Welcome to the Threat Context Monthly blog series where we provide a comprehensive roundup of the most relevant cybersecurity news and threat information from KrakenLabs, Outpost24’s cyber threat intelligence team. Here’s what you need to know from May about Scattered Spider, Lumma Stealer and more.

OWASP Top 10 2021 - A09: Security Logging and Monitoring Failures

Logging and monitoring failures occur when security-relevant events are not properly captured, stored, or analyzed, making it difficult or impossible to detect ongoing attacks or respond effectively. These failures include missing logs, incomplete data, ineffective alerting mechanisms, insecure log storage, and inadequate retention policies. Such gaps are often exploited by attackers who rely on invisibility to move laterally across systems.