Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security

The latest News and Information on Application Security including monitoring, testing, and open source.

Customizable Roles and Permission in ASPM Platforms

The rising adoption of Application Security Posture Management (ASPM) platforms by organizations to manage their application security from a single platform has led to new requirements, especially in large organizations with diverse workforces and varied responsibilities. While centralization through ASPM enhances visibility, it also creates a single point of failure if not implemented correctly. Therefore, granular access controls are crucial to prevent unauthorized access.

Cisco Research AI Inference Infrastructure Summit

Cisco Research hosted a virtual summit on AI Inference Infrastructure, bringing together researchers to explore challenges in this space. The summit includes presentations from university professors and students collaborating with the Cisco Research team, including Aditya Akella (UT Austin), Rachee Singh (Cornell University), Alexey Tumanov (GA Tech), and Neeraja Yadwadkar (UT Austin).

Best DevSecOps Tools for Application Security in 2025

Building secure applications is about more than just adding security features at the end of the development process. It’s about addressing vulnerabilities and threats as they arise and improving security continuously—right from the start. That’s the power of DevSecOps.

Custom Policy Management in Black Duck SCA | Black Duck

You need the ability to tune open source risk management based on your team's unique risk tolerance and application lifecycle. Black Duck SCA enables this with custom policy configuration, allowing you to... Explore the powerful customization options in BlackDuck SCA to manage and mitigate risks effectively.

Automating SOC 2 Application Security with Jit + Drata

Checking off application security requirements for SOC 2 compliance is often a burden for everyone involved. Security and GRC teams need to manually upload evidence to SOC2 compliance systems like Drata, while development teams suddenly need to use code security scanners that throw wrenches in the SDLC.

Tech Shifts: John Parello on what the Internet of Agents means for the future of AI

The Internet of Agents (IOA) is an open, interoperable internet for quantum-safe agent-agent collaboration. It’s paving the way for smarter interactions, enhanced security, and seamless connectivity on a global scale. Outshift by Cisco’s John Parello, Principal Engineer, shares more about how IOA is shaping the future and what it means for businesses, careers, and innovation.

The Advantage of Using VEX SBOMs

Software Bills of Material (SBOMs) are documents which contain a list of components and dependencies of a given software ecosystem, like a list of ingredients in a recipe. On its own, an SBOM can provide some context to how the application was created, what kinds of functionality it may contain, as well as provide a glimpse into the lifecycle of the software project.

Prisma and PostgreSQL vulnerable to NoSQL injection? A surprising security risk explained

Imagine you’re building a blogging web app using Prisma. You write a simple query to authenticate users based on their provided email and password: Looks harmless, right? But what if an attacker sends password = { "not": "" }? Instead of returning the User object only when email and password match, the query always returns the User when only the provided email matches. This vulnerability is known as operator injection, but it’s more commonly referred to as NoSQL injection.

How to Securely Embrace the AI Revolution in Software Development

Software development is one of the most impacted workflows in the Artificial Intelligence revolution. How will you handle the AI-driven revolution in software development securely? Check out this video to see how our innovation can help you stop risks in AI and the software supply chain at the start.