Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2023

Unveiling Java Library Vulnerabilities

During a recent customer engagement, we encountered an interesting situation. The customer had raised concerns about a Java XXE (XML External Entity) vulnerability that had left their developers puzzled. Notably, their Static Application Security Testing (SAST) scans consistently identified this as a potential vulnerability.

The Comprehensive Web Application Security Checklist [with15 Best Practices]

Over 75% of all cybercrimes primarily target web applications and their vulnerabilities. Attackers focus on exploiting weaknesses such as design flaws, vulnerabilities in APIs, open-source code, third-party widget issues, and access control problems. A recent study predicts that all this cybercrime will cost a massive $5.2 trillion by 2024 across all industries. How do you protect your web application from all the risks out there? Here is a go-to web app security checklist to get started.

Top 6 DevOps Web Application Security Best Practices

In today’s world, the importance of incorporating web application security best practices cannot be overstated. Recent studies show that web applications are the top attack vector in nearly 80% of incidents. The good news is DevOps processes lend themselves to integrated security practices. Here are the top six best practices for seamlessly weaving web application security into DevOps.

Sponsored Post

How to Streamline Vulnerability Management

The current cyber world is a veritable minefield, with problems and dangers evolving at a rate that far outstrips the ability of most organizations to respond. More than merely a technical issue, an organization's security posture is determined by the quality of its vulnerability management.

This Month in Datadog: Heatmaps Updates, API Catalog, Content Packs for Cloud SIEM, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on a pair of Heatmaps updates..

Add to Your AppSec Arsenal with Mend.io's Integration with Secure Code Warrior

We’re delighted to announce that Mend.io has launched a new integration with Secure Code Warrior®, a platform that provides secure coding training and tools that help shift developer focus from vulnerability reaction to prevention.

How StoryChief's CTO uses Aikido Security to sleep better at night

Losing sleep imagining bad actors infiltrating your awesome new startup’s code? Not anymore! Aikido Security has designed startup security to be affordable, efficient, and fill the needs of CTOs. Let’s have a look at how Aikido transformed StoryChief’s security posture.

Indigov's security team uses Datadog Cloud SIEM & Log Management to reduce mean time to respond

Watch this video to learn about how Indigov’s Security team (that runs their SOC, compliance program, and operations to support developers throughout the software development lifecycle) has deemed Cloud SIEM as one of the easiest and most integrated platforms to drive down response time from hours to minutes. Datadog Log Management has helped Indigov centralize all disparate data into one spot and Datadog Cloud SIEM’s out of the box detection rules and workflows have helped to capture their incident response process–driving response time down from hours to minutes!

Get Management Buy-in with AppSec Metrics

Getting management to back your application security plans can be a tough sell. Metrics are vital because they help you understand how effective your initial cybersecurity measures are and how to turn them into measurable data that's easy for everyone to understand. This article will explore how to use metrics to get the support you need and make your application security programs more effective.

New ESG Research Report Outlines Best Practices for Effective Application Security Programs

New research from TechTarget’s Enterprise Strategy Group (ESG) has identified that organizations’ application security programs struggle to keep up with the pace of software development, and it reveals best practices to secure modern software applications.

Thought your Node.js latest Docker image was safe?

For all developers who run containerized JavaScript workloads in production: Is relying on node:latest as your base image a safe choice? It's effective from a developer productivity standpoint as you're up and running quickly. Have you ever wondered if the image is secure? This blog post examines the potential security implications of using node:latest as your base image.

Web Application Security: 5 Security Tips for Software Engineers

As a software engineer in a cloud-native world, you’re the first line of defense in web application security. Armed with a few best practices that have a huge impact, securing both the code you create and the code you compile can be simple. Here are five tips that make your role easier in protecting data with secure development.

Find open source vulnerabilities in containers with Black Duck Binary Analysis | Synopsys

Discover how to identify open source components and vulnerabilities in various software binaries including container images, mobile apps, and embedded software with Black Duck Binary Analysis What’s covered?

Track and manage open source risks across your application portfolio with Black Duck SCA | Synopsys

Learn how your security teams can take a proactive approach to managing open-source risk using Black Duck. Join us as we explore the process of analyzing scan results, addressing new CVEs, and prioritizing remediation efforts.

Find secure, compliant, and high-quality OSS components with Black Duck SCA | Synopsys

In this video, we take you on a tour through Black Duck’s SCA tool to show you how you can find and select the most high-quality open-source components for your applications. Key Highlights: Ready to save time and innovate with confidence? Visit synopsys.com/blackduck to learn more about obtaining visibility into component health and viability.

Build an SBOM in under 30 seconds with Black Duck SCA | Synopsys

In this video, we show you how easy it is to create an open source Software Bill of Materials (SBOMs) using Black Duck. Join us as we demonstrate how to effortlessly generate an SBOM in under 30 seconds, empowering enterprise teams to prioritize SBOM creation.

Secure Your Entire Cloud Native Application, From Code to Cloud, with Panoptica

Panoptica allows you to assess threats and act upon them. Watch for an introduction to Panoptica's product features. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Panoptica Overview - How to Assess and Address Security Threats For Cloud Native App Security

Panoptica allows you to assess and address security threats. Watch this tour of Panoptica's security features and capabilities. Outshift is Cisco’s incubation engine, innovating what's next and new for Cisco products and sharing our expertise on emerging technologies. Discover the latest on cloud native applications, cloud application security, generative AI, quantum networking and security, future-forward tech research, our latest open source projects and more.

Does AI lead to AppSec hell or nirvana?

The use of artificial intelligence in every area of life — from writing papers to maintaining critical infrastructure to manufacturing goods — is a controversial topic. Some are excited about the possibilities that come with AI/ML tech, while others are fearful and reticent. These differing opinions raise a fundamental question: will AI turn our modern-day society into a utopia or a dystopia?