Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Riscosity

Secure your code and protect your data flows with Riscosity and Semgrep

Semgrep is a leading static application security testing (SAST) tool powered by an open-source community for surfacing bugs, discovering vulnerabilities, and enforcing code standards. Semgrep has scanned over 75 million packages, contributed to 2000 community rules, and supports over 30 coding languages. Riscosity is the leading data flow observability and security platform. This is why we’re excited to announce Ricosity’s new integration with Semgrep.

A Comprehensive Guide to Open-Source Security

Open source security is a term used to describe the process of protecting your organization’s data and network from attack by using open-source software. It refers to the use of open-source software (OSS) for data protection. Open source software is free to use, meaning that anyone can access it without paying fees. This allows organizations to take advantage of the collective knowledge and experience of thousands of people who have contributed code or worked on projects together.

Data Security Posture Management (DSPM): The Meaning, Importance, and How it Works

DSPM or Data Security Posture Management is the modern approach to securing the information ecosystem. It represents a pivotal shift from the traditional castle-and-moat approach focused on IT devices to one that is focused on data.

Understanding Data Lineage and Data Provenance

Data lineage and data provenance are related terms, but different. Lineage focuses on the origins and movements of data over time, while provenance focuses on the transformations and derivations of data from original sources. Provenance helps teams to follow the source of data and verify its authenticity, surfacing any potential risks or vulnerabilities. In other words, lineage is more about “where” data travels, and provenance is more about the “what” of data history.

Understanding Software Licensing Agreements

The great Yogi Berra is often quoted as having said "in theory, there is no difference between practice and theory. In practice, there is." Perhaps the same can be said about software licensing agreements. There are often two dimensions to any software license agreement: what’s in the agreement and how the commercial relationship is implemented in practice.

Welcoming Bob Lyle,Our Chief Revenue Officer

‍We are thrilled to welcome Bob Lyle to Riscosity as our Chief Revenue Officer. Bob is an accomplished executive with extensive GTM experience in scaling software and security companies. He will be responsible for the planning, development, and global execution of our revenue strategy as we continue to evolve our business.

Unveiling Application Security: Threats, Tools, and Best Practices for 2024

In today's rapidly evolving digital landscape, application security has become a critical component of modern software development. As cyberattacks grow more sophisticated, ensuring the integrity of applications and protecting sensitive data that these applications store, process, or handle is of paramount importance. In this blog post, we will delve into the world of application security - exploring key components, testing techniques, essential tools, and best practices - to help you stay ahead of the curve and safeguard your applications from cyber threats.