Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Application Security including monitoring, testing, and open source.

Veracode CEO Brian Roche: How to Scale a Tech Company in the AI Era | Vlad Kachur Show Exclusive

How do you scale a world-class tech company while staying ahead in application security and AI-driven innovation? In this powerful exclusive interview on The Vlad Kachur Show, Brian Roche, CEO of Veracode, breaks down exactly how he transformed Veracode into one of the globe's leading application security platforms trusted by enterprises worldwide.

Application security in the age of AI with Farshad Abasi

Join us for this session of Defender Fridays as we explore application security in the age of AI with Farshad Abasi, CEO and Co-founder at Eureka DevSecOps. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

How to Get Your Board to Care About Security (Before a Breach Forces the Issue)

If you’ve ever read one of those “Board Reporting Templates for CISOs” articles and thought, “Ah yes, surely my board will dedicate 25 minutes to my posture dashboard and ask follow-up questions about vulnerability backlog burn-down velocity,” then I have wonderful news for you: You have not met enough boards. Most enterprise boards don’t want a security dashboard. They don’t want posture metrics.

Why Claude Code Security Is a Big Moment for Application Security

Anthropic’s launch of Claude Code Security is exciting. Not because it changes everything overnight — but because it confirms something important: AI-powered security inside the developer workflow is becoming the new normal. And that’s a win for the entire industry.

The Myth of Self-Healing Code: Why Claude Code Security Isn't Replacing Application Security

Anthropic recently launched Claude Code Security, an AI-powered vulnerability scanner that can analyze your codebase, trace data flows across files, find bugs, and even propose patches. It represents a meaningful advance in how developers can get security insights earlier in the development process. But let’s be clear: this is not a replacement for a comprehensive application security program.

The Mobile AppSec Evaluation Guide for Security Leaders

Mobile security feels mature. Enterprises scan frequently, track findings, and report posture upward. Yet under regulatory scrutiny, cracks appear. This gap between perceived security and defensible governance is where mobile AppSec quietly fails. The illusion isn’t that security isn’t happening. It’s that it isn’t aligned with how regulated risk actually operates.

What is Slopsquatting? The AI Package Hallucination Attack Already Happening

Typosquatting, registering a typoed version of a popular package and waiting for a developer to accidentally type and install the wrong package, has been around for a decade in npm. It’s nothing new— the registry has protections for it. Then AI came along and changed everything again. Slopsquatting is the new, AI flavor of typosquatting. Instead of betting on human typos, attackers bet on AI hallucinations, the package names that LLMs confidently recommend that don't actually exist.

The Attackers Lens The Hidden Path To Largescale LLM Exploits

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

A 101 Guide to Web Application Security

Web application security is the prevention and protection of web applications through protocols and processes implemented to ensure a cyber threat and vulnerability-free web environment. Modern applications need to handle sensitive customer data, financial transactions, and proprietary business data, as most of the world has transitioned to digital business. As a result, these systems have been prime targets for various attackers seeking to exfiltrate data, disable services, or gain access to the systems.