Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Application Security including monitoring, testing, and open source.

Secure your application development with AWS and Mend

Mend, formerly known as WhiteSource, effortlessly secures what developers create. Mend uniquely removes the burden of application security, allowing development teams to deliver quality, secure code, faster. With a proven track record of successfully meeting complex and large-scale application security needs, the world’s most demanding software developers rely on Mend. The company has more than 1,000 customers, including 25 percent of the Fortune 100, and manages Renovate, the open source automated dependency update project.

Building an application security battle plan: Home Alone edition

The holiday season is the perfect time to rewatch some favorite festive movies! While some prefer their holiday movies to be as sappy as possible (Hallmark, we’re looking at you), others relish the annual opportunity to watch an 8-year-old boy exact his revenge on two bumbling bad guys in the 1990 classic Home Alone.

How to Maximize the Value from Your SAST Tool

It stands to reason that if you’ve implemented a Static Application Security Testing (SAST) tool, you’ll want to reap the full value of the investment. But to accurately assess ROI, you need metrics that can evaluate factors such as overall results, KPI compliance, and timeframe. Only then can you estimate whether you’re making a real improvement to the security of your code base, and from that, assess the monetary value of these results.

Install Greenlight Visual Studio Extension

In this video, you will learn how to install the Veracode Greenlight for Visual Studio extension. Veracode Greenlight finds the defects in your code as you write it and provides recommendations and code examples to help you fix them directly in your IDE. It allows you to write quality secure code from the very beginning while perfecting your understanding of application security Best Practices.

Best practices for application security in cloud-native environments

Editor’s note: This is Part 3 of a five-part cloud security series that covers protecting an organization’s network perimeter, endpoints, application code, sensitive data, and service and user accounts from threats. In Parts 1 and 2 of this series, we discussed the importance of protecting the boundaries of networks in cloud environments and best practices for applying efficient security controls to endpoints.

The Risks and Benefits of Updating Dependencies

One of the most important steps of securing your code base, your software, and your applications, is to update the dependencies they rely on. In principle, maintaining software health with updates demands that you use recent versions of any software and dependencies. Recent updates are less likely to be exploited and attacked via publicly known vulnerabilities than older versions, because with the latter, malicious actors have had more time to hunt for weaknesses.

This Month in Datadog: Cloud SIEM Investigator, API Catalog, Expanded AWS Coverage, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on Universal Service Monitoring..

In Modern AppSec, DevSecOps Demands Cultural Change

This is the final of a six-part blog series that highlights findings from a new Mend white paper, Five Principles of Modern Application Security Programs. When thinking of adjectives to describe cyberattackers, it’s doubtful that many people would choose to call them innovative – a term we’re more likely to ascribe to things we enjoy. But the reality is that adversaries are innovative, constantly finding new ways to launch attacks that result in greater rewards for less effort.

How Firstup extends security organizational wide with Datadog and AWS

n this video, learn how Datadog’s integrated solutions can increase visibility and improve collaboration between DevOps and security teams in real time. In this session, you will learn how Chad Upton, Vice President of Infrastructure at Firstup, uses Datadog Cloud Security Management to bring together cloud security and observability to enable their engineers to continuously maintain security and compliance best practices across their AWS assets. You’ll also get the chance to hear from Ray Zaman, Solutions Architect at AWS, on how to easily surface and remediate misconfigurations of your AWS environment with Cloud Security Management.

Introduction to Web Application Security: Why It's Important to Keep Your Website Safe

As web applications become more complex and interconnected, the security of these applications becomes increasingly important. In this article, we will discuss web application security, why it is crucial, and how you can test your web applications for security vulnerabilities. By taking measures to secure your website, you reduce the risk of cyberattacks, protect your data from unauthorized access, and save you and your business time and money.