Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mend.io Product Overview Demo

Mend.io solves the toughest problems in application security for the largest and most demanding organizations in the world, and we do it with automation. Mend.io was the first application security vendor to provide automated remediation workflows for both open source and custom code. We have centered our product strategy on providing industry-leading prioritization of application security threats for both OSS and custom code, integrating automated dependency health to reduce the attack surface and ensuring fast and limitless scale to onboard developers and applications.

SBOMs: A Roadmap for a Secure Software Journey

Software supply chain threats and increasing regulatory pressures make supply chain security a top priority for software organizations. While building secure applications is a must for any organization, the path to creating secure software is anything but clear. Software bills of materials (SBOMs) have emerged as an essential tool and a roadmap for organizations on their secure software journey.

Highlights From Impact Boston 2023

IMPACT is CyberArk's annual customer and industry conference. More than 3,000 security leaders and practitioners participated in Boston and virtually to discuss the ever-expanding attack surface, attacker techniques and trends in identity-based cyberattacks, and the latest innovations in Identity Security technology. In-person attendees took advantage of hands-on product training and labs sessions, and obtained valuable certifications, as well as exchanged best practices and learnings with other customers.

1.2 Million Patients Lose Data to Tampa General Hospital Breach

Tampa General Hospital is a mid-sized medical facility that caters to locals in the Tampa area. The hospital has 1,040 beds available and serves as a research and academic center, along with offering tertiary care to its patients. The facility is located in Tampa, Florida, and is an essential hospital for maintaining the care of patients throughout the area. The hospital was recently hacked, exposing more than 1.2 million patients that depend on the facility for medical services.

The Secret's Out: Researchers Reveal Backdoor in Emergency Radio Encryption

For over 25 years, a technology utilized for vital data and voice radio communications globally has remained under wraps, preventing in-depth testing for potential vulnerabilities. However, a small group of researchers in the Netherlands has now shed light on it, uncovering significant flaws, including a deliberate backdoor.

CloudCasa July Feature Updates

It’s been about three months since the last CloudCasa feature release in April, and we are now approaching the Dog Days of summer. These, as you may know, are named for the heliacal rising of Sirius, the Dog Star, in this sultry season, though the term more often conjures images of dogs lazing in the hot summer sun. We have been doing no summer lazing here at CloudCasa, though! Since our April release, we have focused much of our development effort on performance and reliability improvements.

The New Era of AI-Powered Application Security. Part Three: How Can Application Security Cope With The Challenges Posed by AI?

This is the third part of a blog series on AI-powered application security. Following the first two parts that presented concerns associated with AI technology, this part covers suggested approaches to cope with AI concerns and challenges. In my previous blog posts, I presented major implications of AI use on application security, and examined why a new approach to application security may be required to cope with these challenges.