Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vulnerability

Node.js multithreading with worker threads series: worker_threads tutorial

Node.js provides a single-threaded JavaScript run-time surface that prevents code from running multiple operations in parallel. If your application typically employs synchronous execution, you may encounter blocks during long-running operations. However, Node.js itself is a multi-threaded application. This is evident when you use one of the standard library’s asynchronous methods to perform I/O operations, such as reading a file or making a network request.

Attack Surface Management vs. Vulnerability Management

Cyber innovation and digital transformation are moving at increasing speeds. With the shift to cloud-based software and assets, SaaS (software-as-a-service) applications, and the need for remote working, businesses are changing the way they approach risk management and the security of their digital assets.

How to send Snyk vulnerability data to the New Relic observability platform

Security and observability data go hand in hand when it comes to application health. If you can put those two sources of data behind a single pane of glass you can make your life a lot easier. By leveraging the different options that the Snyk platform provides, you can send all your application security vulnerabilities found by Snyk directly to your New Relic observability platform. Let’s see how!

What is Vulnerability Remediation?

Vulnerability remediation is the process of finding, addressing, and neutralizing security vulnerabilities within an organization’s IT environment, which can include computers, digital assets, networks, web applications, and mobile devices. Remediation is one of the most important steps in the vulnerability management process, which is critical for securing networks, preventing data loss, and enforcing business continuity.

How to make a mock API server in JavaScript

Developing and testing a frontend feature can be difficult, especially when the backend it depends on is not ready. This dependency on a backend API often slows down the development process. In scenarios like this, developing a mock API can save you a lot of time by allowing you to develop your feature independent of the backend, and make it easier to test and identify scenarios where your API might fail before it is ready.

Cloud security fundamentals part 3: Empower your developers

In our previous blog breaking down The 5 Fundamentals of Cloud Security, we looked at the value of prevention and secure design. Mapping resource relationships and enforcing security guardrails throughout development helps greatly reduce an available attack surface. But who will enforce these guardrails when your security team is busy with other work? This should be where developers are able to step in. So let’s look at another vital element in cloud security: empowering developers.

Manufacturing Overtakes Financial Services As The Sector With Fewest Software Security Flaws

72 percent of applications contain vulnerabilities, and 12 percent are considered 'high severity' - the lowest of all industries analyzed. Sector still has room for improvement, with some of the lowest and slowest fix rates, especially for open-source flaws.

Remote Code Execution Vulnerability Discovered in HSQLDB

19.10.2022 - As part of our goal to continuously improve our vulnerability detectors, we continuously test various open-source projects with Jazzer within OSS-Fuzz. In this case, a test run yielded a severe finding with a potential remote code execution in a HSQLDB (CVE-2022-41853).