Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security

The latest News and Information on Application Security including monitoring, testing, and open source.

Motific's Intelligence Feature

Motific's intelligence feature dives deep into Motif activity, offering valuable business insights. You'll see details on prompt usage, time saved, and performance metrics for each Motif. The Time Savings dashboard showcases efficiency gains compared to manual document creation, while task usage and optimization metrics provide even more insights into a Motif's effectiveness.

Motific's Policies Feature

This video dives into how Motific policies work. See it in action with a marketing use case that we implemented as an Off-Topic Detection policy to filter specific words. This policy successfully blocks irrelevant queries before they reach the underlying LLM. Users who try off-topic queries will see an error message, guiding them to align with organizational policies and resubmit their request.

Peter Guagenti from Tabnine Discusses the Future of AI Development Tools

Join our host, Michael Chenetz, as he dives into an enlightening conversation with Peter Guagenti, the President of Tabnine. In this episode, they explore the transformative power of AI in software development and how Tabnine is revolutionizing the way developers work.

Key learnings from the State of DevSecOps study

We recently released the State of DevSecOps study, in which we analyzed tens of thousands of applications and cloud environments to assess adoption of best practices that are at the core of DevSecOps today. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can leverage Datadog Application Security Management (ASM) and Cloud Security Management (CSM) to improve your security posture.

Top 10 app security problems and how to protect yourself

You know your latest web application is inherently vulnerable to all kinds of attacks. You also know app security can never be perfect, but you can make it better tomorrow than it was yesterday. The problem is that whether you’re using enterprise-grade (aka, expensive and complex) security tools, or have cobbled together a handful of open-source projects into a CI/CD pipeline or Git commit hooks and are hoping for the best, your toolkit can’t help you see.

Older, Larger, Riskier: The Correlation Between Application Age and Security Debt in the Public Sector

Years of accumulated security debt due to unaddressed software vulnerabilities and inadequate security configurations plague the applications that support our government functions. The age and size of applications play a significant role in the accumulation of security debt. The State of Software Security 2024 report provides a detailed analysis of how these factors correlate with security vulnerabilities, particularly in older and larger applications.

Cloud Unfiltered with Andre Zayarni - Exploring AI and Vector Databases - Episode 13

Join your host Michael Chenetz as he interviews André Zayarni, the CTO of Qdrant, a leader in AI innovation with their cutting-edge vector database technology. This conversation is essential listening for anyone interested in the integration of advanced search technologies and AI in modern applications.

Network Security and Application Security: The Power Duo of Cybersecurity

In a world with frequent technological changes, maintaining the trustworthiness and protection of your data and systems should be of paramount importance. With technology constantly evolving for the better, dangers and susceptibility could also make your online security more extraordinary. This is where the issues of network security and application security appear, which may be referred to as two complementary subtopics.