DevSecOps
JFrog Survey Surfaces Raft of DevSecOps Challenges
A JFrog survey found that 60% of IT professionals typically spend four days or more remediating application vulnerabilities in a given month ...
appCD Launches Platform to Securely Provision Cloud Infrastructure
appCD's platform analyzes an application about to be deployed and automatically generates the code to provision the required infrastructure ...
AISecOps: Expanding DevSecOps to Secure AI and ML
AISecOps, the application of DevSecOps principles to AI/ML and generative AI, means integrating security into models' life cycles ...
Cycode Acquires Bearer to Extend ASPM Platform
Cycode has acquired Bearer, a provider of a set of tools for SAST, API discovery and identification of sensitive data ...
Survey Sees Limited DevSecOps Progress Being Made as Vulnerabilities Mount
A recent survey found that, on average, organizations have 55.5 security vulnerabilities each day in their remediation queue, with at least one critical ...
Securing the DevOps Pipeline: Tools and Best Practices
Because of the critical nature of the DevOps pipeline, security is becoming a top priority. Here's how to integrate DevSecOps ...
Why DevOps is Key to Software Supply Chain Security
Organizations can maintain their DevOps momentum while protecting the software supply chain by shifting security left ...
Cycode Brings Generative AI to App Security Posture Management
Cycode's generative AI capabilities in its ASPM platform make it simpler for DevSecOps teams to identify the root cause of vulnerabilities ...
Techstrong Research: Combatting CI/CD Security Anti-Patterns
Techstrong Research finds the imperative to secure the software supply chain and CI/CD pipelines is undeniable and urgent ...
ReversingLabs Applies AI to Better Secure Application Binaries
ReversingLabs launched a binary analysis tool that uses machine learning algorithms to identify risks before and after apps are deployed ...
Veracode Report Shines Spotlight on Massive Application Security Debt
In an analysis of more than a million applications, Veracode found 42% contained flaws that remained unfixed for longer than a year ...
Squaring the Circle: How to Make Public APIs Private
Many API attacks are effectively zero-day, novel attacks that exploit recent and unique changes to specific APIs. Here's how to stop them ...