Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Application Security including monitoring, testing, and open source.

How Firstup extends security organizational wide with Datadog and AWS

n this video, learn how Datadog’s integrated solutions can increase visibility and improve collaboration between DevOps and security teams in real time. In this session, you will learn how Chad Upton, Vice President of Infrastructure at Firstup, uses Datadog Cloud Security Management to bring together cloud security and observability to enable their engineers to continuously maintain security and compliance best practices across their AWS assets. You’ll also get the chance to hear from Ray Zaman, Solutions Architect at AWS, on how to easily surface and remediate misconfigurations of your AWS environment with Cloud Security Management.

Introduction to Web Application Security: Why It's Important to Keep Your Website Safe

As web applications become more complex and interconnected, the security of these applications becomes increasingly important. In this article, we will discuss web application security, why it is crucial, and how you can test your web applications for security vulnerabilities. By taking measures to secure your website, you reduce the risk of cyberattacks, protect your data from unauthorized access, and save you and your business time and money.

Configure the API Credentials File on Windows

In this video, you will learn how to generate Veracode API credentials in the Veracode Platform and configure an API credentials file for storing your API credentials on Windows. Veracode API credentials consist of an ID and secret key. You use these credentials to access the Veracode APIs and Veracode integrations. API ID and key authentication provides improved security and session management for accessing the APIs.

Datadog Cloud Security Management Demo

Datadog Cloud Security Management provides security context for your observability data to help you quickly identify threats and misconfigurations across your infrastructure. In this demo, we show you how Cloud Security Management allows you to remediate threats, collaborate with other teams, and declare incidents for further investigation, giving you complete cloud-native application protection.

Must Know Approaches for Maintaining Mobile Application Security and CIA Traits

Nowadays, every business wants to reach out to a larger audience. And the best way for it is Mobile App Development. Whether someone is at work, at home, or somewhere outside, people frequently go through apps on their mobiles. Such apps collect data, store it and process it to provide reliable results. Indeed, our sensitive and confidential data is also getting into the same process. Hence, it makes a top priority to focus on mobile application security.

Modern Application Security Needs More Than Tech. Don't Neglect Governance

This is the fifth of a six-part blog series that highlights findings from a new Mend white paper, Five Principles of Modern Application Security Programs. Be sure to look out for our upcoming blogs on each of the five principles. While IT and security professionals all generally agree that cyberattacks are on the rise, there remains a great deal of disparity in how they choose to prepare for those attacks.

SAST - All About Static Application Security Testing

Static Application Security Testing (SAST) has been a central part of application security efforts for more than 15 years. Forrester’s State Of Application Security Report, 2022 found that lacking application security remains a leading cause of external security breaches, so it’s safe to say that SAST will be in use for the foreseeable future. Contents hide 1 What Is SAST? 2 Why do we need SAST? 3 What problems does SAST address? 4 How does SAST work?

SAST - All About Static Application Security Testing

Static Application Security Testing (SAST) has been a central part of application security efforts for more than 15 years. Forrester’s State Of Application Security Report, 2022 found that lacking application security remains a leading cause of external security breaches, so it’s safe to say that SAST will be in use for the foreseeable future.

4 Reasons Scan Results May Differ Over Time: Advice from an Application Security Consultant

You didn’t change anything in your code, yet the scan is different this time. Here’s advice from an Application Security Consultant on why that may be. Have you ever wondered why you scan code one day and get one result, and then scan the same code a month later and get different results – even though you never changed anything?