Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security

The latest News and Information on Application Security including monitoring, testing, and open source.

Application Security Challenges and Trends for the Year 2024

Every year, new technologies are released; with them, professionals are discovering new sets of application vulnerabilities. However, some threats and challenges are constant in the list, such as malware and app spoofing. However, all the threats are now more powerful with the advancement of tools. Further, it’s expected that the mobile app security challenges will be more rigid in 2024.

The Darkside of GraphQL

GraphQL is a query language for APIs that provides a powerful and efficient way to query and manipulate data. As powerful and versatile as GraphQL is, its downside is that it can be vulnerable to certain security threats. In this presentation, we will discuss the security vulnerabilities associated with GraphQL, from the basics to more advanced threats, and how to best protect against them. After this presentation, attendees will have a better understanding of security vulnerabilities in GraphQL, as well as an understanding of the steps needed to protect against them.

The Future of Cloud Security: Attack Paths and Graph-based Technology

Learn about the power of leveraging graph-based cloud security technology to improve cloud security teams' ability to navigate and assess critical risks in multi-cloud environments. This whitepaper reveals why modern security teams are turning towards graph-based technology to accurately discover and prioritize cloud risks. Understand the nuances, benefits, and the need for a graph-driven approach alongside attack path analysis capabilities, to better secure multi-cloud ecosystems.

Enhancing Security with eBPF: Use Cases Explored

eBPF, short for Extended Berkeley Packet Filter, is a kernel technology that allows programs to run without requiring changes to the kernel source code or the addition of new modules. eBPF was built on top of the Berkeley Packet Filter (cBPF). Notable milestones in its development include the first in-kernel Linux JIT compiler in April 2011 and the first non-networking use case of the classic Berkeley Packet Filter, seccomp-bpf, appearing in January 2012. It can be used for a variety of purposes.
Sponsored Post

How Malicious Code Enters Applications

As the backbone of modern business operations, applications are frequently targeted by sophisticated malicious threats. In this blog post, we provide a high-level overview of how malicious code can enter your software applications. We look at different forms of malicious code, their entry points, practical tools and strategies for detection & prevention, focusing on innovative solutions.