Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August 2023

7 AppSec tips from Snowflake's Director of Product Security

At this year’s AWS re:Invent, Mic McCully, Field CTO at Snyk, spoke with Jacob Salassi, Director of Product Security at Snowflake. They discussed what it looked like for Snowflake to overcome various security challenges with the right combination of processes, company culture shifts, and tool partners (including Snyk!). Read on to learn about the practices Jacob and his team established to create a successful application security program.

Three Takeaways on Cloud Security from the IBM Data Breach Report 2023

IBM’s annual Cost of a Data Breach Report offers its usual insights into the scale of cybercrime and the costs of security breaches. It paints a picture of a technological landscape which is becoming more complex, demanding and uncertain. As organizations increasingly migrate to cloud platforms, the need to fortify these digital landscapes against a plethora of threats has never been more crucial. So, what are the biggest takeaways from this year’s report with focus on cloud security?
Sponsored Post

A Guide to Becoming a Product Security Engineer

As companies increasingly digitalized, the necessity for cybersecurity has never been more vital. Product security engineers are in great demand since they are responsible for securing software products, operating systems, and the underlying infrastructure against potential attacks. Assuming you're interested in cybersecurity and want to work in it, this article will provide the information you need to begin your own career path as a product and application security engineer.

Webinar | Securing Application Workloads, APIs, and Serverless Functions with Panoptica

Application architectures have been transformed in recent years. Modern application systems have become more complex with monolithic applications being replaced by more complicated applications based on multiple microservices and stored on cloud platforms. These applications run on new technologies based on Kubernetes, an open-source container orchestration system that automates the deployment, scaling, and management of containerized applications.

Malicious Packages Special Report Overview

Malicious Packages: A Growing Threat to the Software Supply Chain The global economy runs on software applications, and their function and security are critical to every company’s success. Many applications have exploitable vulnerabilities that modern defenders struggle to effectively detect and remediate. In addition to the growing number of vulnerabilities, today’s security teams face the emerging challenge of malicious packages.

How to Shift-Left Better with Git Hooks

The philosophy of "shifting left" in software development is transforming the way we approach error and resolution. By moving the focus of error detection to earlier stages in the development cycle, teams can address issues when they are more accessible and less expensive to fix. Integral to this shift-left approach are Git hooks, powerful tools that allow us to enforce quality control right from the code-commit stage.

Five Key Application Security Best Practices and Benefits for Maintaining Up-to-Date Dependencies

We’re using more code, software components, and dependencies than ever before, making security breaches an ever-growing threat. It’s easy for developers and DevOps teams to neglect dependency updates when faced with such high volume, but doing so allows applications to fall behind the latest versions if not properly managed. This typically leaves applications using outdated dependencies, which exposes them to ever-increasing security debt and risk.

Application Security Report: Q2 2023

Cloudflare has a unique vantage point on the Internet. From this position, we are able to see, explore, and identify trends that would otherwise go unnoticed. In this report we are doing just that and sharing our insights into Internet-wide application security trends. This report is the third edition of our Application Security Report. The first one was published in March 2022, with the second published earlier this year in March, and this is the first to be published on a quarterly basis.

An Introduction to Application Security

While security teams may “run on Dunkin’,” companies run on applications. From Salesforce and Hubspot to ServiceNow and Jira, your organization relies on a complex, interconnected application ecosystem. In 2022, organizations used an average of 130 Software-as-a-Service (SaaS) applications. While these technologies enabled them to reduce costs and achieve revenue targets, they created new security risks.

Application Security Requirements: Trends and Best Practices

Ensuring application security is not just about protecting data. It’s about safeguarding your company's reputation, keeping customer trust, and adhering to increasingly stringent regulatory requirements. Read on as we delve into application security requirements: the pressing security threats impacting applications, the critical security requirements your application needs to meet, and the best practices to adopt to achieve robust application security.

Securing your Software Supply Chain

Composability has rapidly accelerated the pace of software development by allowing engineers to reuse openly shared libraries and packages. But the widespread adoption of these components also makes them an enticing avenue of attack for malicious actors. In this fireside session, André Arko (Head of Open Source, Ruby Central) and Dustin Ingram (Director, Python Software Foundation) will join Emilio Escobar (CISO, Datadog) for a discussion about securing your software supply chain.

Creating a Culture of Security

Just as DevOps is more than just CI/CD tooling, DevSecOps is more than simply scanning code for vulnerabilities in your deployment pipeline. Creating a culture where every engineer is invested in reducing risk and values security can be challenging. In this panel session, we’ll chat with engineering leaders from security, development, and operations to learn how they’re fostering a culture of security in their organizations.

Consolidate Your AppSec Solutions and Reduce Risk | Synopsys

Synopsys has it all: best-of-breed capabilities, a proven track record as an industry leader, and the expertise and staying power an organization needs to be successful. For organizations facing unknown levels of software risk and unnecessary complexity and inefficiency in their AppSec initiatives, working with the right vendor will streamline your AppSec environment, so you can manage software risk before it becomes business risk.

Managing Internal Dependencies with Black Duck: New Custom Component Capability | Synopsys

Discover the latest capabilities in Black Duck for efficient custom component management and handling internal dependencies. This video provides insights into the automatic identification of new custom components within Black Duck, enhancing its existing capabilities for open source and internal dependency management. Learn how to navigate… unknown components create custom components and seamlessly integrate them into your projects.

Navigating the complex landscape of dynamic app security with AlgoSec AppViz

In the fast-paced world of technology, where innovation drives success, organizations find themselves in a perpetual race to enhance their applications, captivate customers, and stay ahead of the competition. But as your organization launches its latest flagship CRM solution after months of meticulous planning, have you considered what happens beyond Day 0 or Day 1 of the rollout?

Reproducing common attacks in the cloud with Stratus Red Team

Stratus Red Team is a project that allows you to easily reproduce, understand, and detect common attack techniques in the cloud. As a self-contained tool, you can also use it to validate your threat detection logic. In this video, Christophe walks through the use of Stratus Red Team to reproduce a common AWS attack.

Gartner Hype Cycle for Application Security 2023 - Appknox Among Top Vendors in Mobile Application Security Testing

Gartner Hype Cycle for 2023 assesses the levels of maturity, adoption, and societal effects associated with emerging technologies in the field of Application Security. The 2023 report serves as a valuable resource for organizations seeking insights into the influence of security technologies on their applications. It also highlights the market leaders in the respective fields - Appknox being this year's leading vendor in mobile application security testing.

Mend.io Supply Chain Defender

Mend Supply Chain Defender helps protect enterprises against software supply chain attacks. It detects and blocks malicious open source packages before your developer can download them — and before they can pollute your codebase with malicious activity. Mend Supply Chain Defender has already detected and reported thousands of malicious packages that were swiftly removed from their registries, to protect open source users from accidentally installing malicious code.

Mend.io JIRA Security Dashboard Integration

Overview The Mend Jira Security Dashboard is a new option included in the Jira Cloud plugin that provides a centralized view of security issues and risks across all Jira projects, making it easier for you and your teams to prioritize and address security concerns. Use cases for the Jira Security Dashboard The Mend Jira Security Dashboard addresses the following scenarios: As an AppSec Manager, it is imperative to have real-time visibility into the overall security health of your development teams' applications within your issue-tracking tool, Jira.

Simplify AppSec program management with Software Risk Manager

In a world where software risk is business risk, you need a robust ASPM solution that simplifies testing, triage and risk management. Now more than ever, organizations are realizing that software risk is business risk, and making application security programs scalable and efficient is paramount to successfully managing that risk.