Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Application Security

The latest News and Information on Application Security including monitoring, testing, and open source.

An Introduction to Application Security

While security teams may “run on Dunkin’,” companies run on applications. From Salesforce and Hubspot to ServiceNow and Jira, your organization relies on a complex, interconnected application ecosystem. In 2022, organizations used an average of 130 Software-as-a-Service (SaaS) applications. While these technologies enabled them to reduce costs and achieve revenue targets, they created new security risks.

Application Security Requirements: Trends and Best Practices

Ensuring application security is not just about protecting data. It’s about safeguarding your company's reputation, keeping customer trust, and adhering to increasingly stringent regulatory requirements. Read on as we delve into application security requirements: the pressing security threats impacting applications, the critical security requirements your application needs to meet, and the best practices to adopt to achieve robust application security.

Securing your Software Supply Chain

Composability has rapidly accelerated the pace of software development by allowing engineers to reuse openly shared libraries and packages. But the widespread adoption of these components also makes them an enticing avenue of attack for malicious actors. In this fireside session, André Arko (Head of Open Source, Ruby Central) and Dustin Ingram (Director, Python Software Foundation) will join Emilio Escobar (CISO, Datadog) for a discussion about securing your software supply chain.

Creating a Culture of Security

Just as DevOps is more than just CI/CD tooling, DevSecOps is more than simply scanning code for vulnerabilities in your deployment pipeline. Creating a culture where every engineer is invested in reducing risk and values security can be challenging. In this panel session, we’ll chat with engineering leaders from security, development, and operations to learn how they’re fostering a culture of security in their organizations.

Consolidate Your AppSec Solutions and Reduce Risk | Synopsys

Synopsys has it all: best-of-breed capabilities, a proven track record as an industry leader, and the expertise and staying power an organization needs to be successful. For organizations facing unknown levels of software risk and unnecessary complexity and inefficiency in their AppSec initiatives, working with the right vendor will streamline your AppSec environment, so you can manage software risk before it becomes business risk.

Managing Internal Dependencies with Black Duck: New Custom Component Capability | Synopsys

Discover the latest capabilities in Black Duck for efficient custom component management and handling internal dependencies. This video provides insights into the automatic identification of new custom components within Black Duck, enhancing its existing capabilities for open source and internal dependency management. Learn how to navigate… unknown components create custom components and seamlessly integrate them into your projects.

Navigating the complex landscape of dynamic app security with AlgoSec AppViz

In the fast-paced world of technology, where innovation drives success, organizations find themselves in a perpetual race to enhance their applications, captivate customers, and stay ahead of the competition. But as your organization launches its latest flagship CRM solution after months of meticulous planning, have you considered what happens beyond Day 0 or Day 1 of the rollout?

Reproducing common attacks in the cloud with Stratus Red Team

Stratus Red Team is a project that allows you to easily reproduce, understand, and detect common attack techniques in the cloud. As a self-contained tool, you can also use it to validate your threat detection logic. In this video, Christophe walks through the use of Stratus Red Team to reproduce a common AWS attack.