IT Security

Venafi Adds Ability to Prevent Unauthorized Code From Running
Venafi added an ability to prevent unauthorized code from running in IT environments that make use of its machine identity management platform ...

Mobb Extends DevSecOps Reach of Tool to Generate Patches
Mobb added an ability to instantly surface patches for vulnerabilities at the time when code is being committed during a DevSecOps workflow ...

Legit Security Applies AI to Detect Vulnerable Application Secrets
Legit Security expanded the scope of its ASPM platform to make use of AI to discover vulnerable application secrets more accurately ...

From Reaction to Robots: Riding the AI Wave in 2024
Investment in security-aware developers and collaboration between them and AppSec teams should be a driving force in 2024 ...

Checkmarx Report Details Havoc Caused by ‘Everything’ Package on NPM Registry
A Checkmarx report details an 'Everything' package distributed via the NPM registry that cripples any machine used to download it ...

Sonar Adds Secrets Detection to Code Analysis Portfolio
Sonar has added a secrets detection capability to its portfolio of tools for analyzing code and DevOps workflows ...

Vulnerability Management for DevOps Teams: A Practical Guide
The goal of vulnerability management is to close the gap between discovery and resolution, thereby minimizing the window of opportunity for potential cyberattacks ...

Synopsys Report Sees Steady Application Security Gains
An analysis of the security automation practices of 130 organizations published by Synopsys suggests significant progress toward securing software supply chains ...

How Encryption Innovation Will Power Cloud Privacy for Developers in 2024
With new encryption technologies rapidly advancing, developers can ensure their applications are secure ...

Veracode Extends DAST Reach Left Toward Developers
Veracode launched a version of its automated DAST tool, dubbed DAST Essentials, that is embedded within an IDE ...

Three Strategies for Reducing MTTD and MTTR as Outage Costs Spiral
In a business environment where most interactions with customers, suppliers and business partners are conducted digitally, downtime has become a problem and an existential threat ...

Lineaje Allies With Persistent Systems on Open Source Software Remediation Service
Lineaje and Persistent Systems are providing a managed service for remediating open source vulnerabilities that leverages AI technologies ...