Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Black Duck SCA vs. Black Duck Audit Services

With a surplus of software security testing solutions on the market, identifying the right SCA solution has never been more important. In today’s world, there is an increasingly large number of software security tools and testing solutions available with a range of capabilities, including software composition analysis (SCA), for managing open source risks.

Container security essentials

As the preferred method for packaging and deploying cloud-native applications, a comprehensive understanding of containers, and how to secure them, has never been so important. As cloud-native applications continue to proliferate, containers are becoming the preferred option to package and deploy these applications because of the agility and scalability they offer. In fact, Gartner predicts that 75% of global organizations are running containerized applications in production.

Why cross-site scripting still matters

With web application exploits the 3rd-most-common cybersecurity threat, overlooking the importance of XSS vulnerabilities puts you at risk. As we move through 2023, many organizations are looking at their cybersecurity programs and considering how to allocate their application security testing resources. While allocating testing resources to OWASP Top 10 vulnerabilities like cross-site scripting (XSS) may not feel innovative, it’s one of the best ways to ensure an organization’s security.

Polaris: Your no-compromise SaaS AST solution

Polaris Software Integrity Platform® – a SaaS application security testing solution delivering speed without compromise. Faster, faster, faster. The pressure is on to do business faster, to develop faster, and to secure all of this with faster and faster AppSec. Businesses want to release products, services, and apps to their customers on shorter and shorter release cycles.

OWASP Top 10: Security misconfiguration

Listed at #5 in the OWASP Top 10 list, security misconfiguration refers to vulnerabilities that result from an application’s configuration. As with insecure design, security misconfiguration is a broad category within the OWASP Top 10. These types of misconfigurations can occur at any level of an application stack, so it’s critical for DevSecOps teams to work together to ensure the entire stack is properly set up.

Production-safe DAST: Your secret weapon against threat actors

Production-safe DAST with WhiteHat Dynamic enables critical security scans in the software production environment. Software powers modern businesses, but these ever-evolving applications and systems can also include vulnerabilities that threat actors can exploit to disrupt, threaten, and steal critical data. But fear not: Robust security processes can mitigate most of these risks and ensure that new features and updates are properly tested.

Automate your DevSecOps to take the pressure off triage

Tools like Code Dx that support automation are the answer to faster software development delivery cadence. Automation is a key component of the secure DevOps, or DevSecOps, approach. Automation is how organizations establish security gates, and it can be used to prioritize findings and triage their remediation response.