Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Vulnerability Management

Long Term Study on Navigating Software Vulnerabilities Shows There’s Work to be Done

We need a more nuanced approach to vulnerability management

July 23, 2024

Security Best Practices

Governance & Compliance

Understanding the Secure Development Lifecycle (SDLC) for App Security

SDLC frameworks integrates security practices throughout software development

July 22, 2024

Customer POV

Application Security (ASPM)

Security Best Practices

Vulnerability Management

Customer POV Part 2: Prioritizing Based on Business Risk

AppSOC automates what I used to do with spreadsheets and ties everything together

July 18, 2024

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Security Guide Step 3: Prioritize Based on Business Context

The most critical capability of an ASPM system is risk-based prioritization

July 16, 2024

Customer POV

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Customer POV Part 1: The Need for Cyber Risk Governance

We have to fully understand the risks that cyberattacks pose to the business

July 12, 2024

Security Best Practices

Application Security (ASPM)

The Crucial Role of Application Security Engineers in Cybersecurity

Application security engineers protect critical applications against threats

July 10, 2024

Partnerships

Industry News

Software Supply Chain

AppSOC Partners with JFrog to Secure Software Supply Chains

Combines power of JFrog Xray with AppSOC ASPM

July 9, 2024

AI Security

Governance & Compliance

Understanding the MITRE ATLAS Matrix for AI Threats

Adversarial Threat Landscape for AI Systems applies ATT&CK methodology

July 3, 2024

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Security Guide Step 2: Correlate Findings Across Tools and Sources

Consolidating data is a good first step, but now you need to connect the dots

July 2, 2024

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Granular Filters Make Security Data Easier to Understand

Bringing together thoughtfully designed dashboards with granular and flexible filter

June 20, 2024

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Why Deduplication is Important for Security

Why Deduplication is Important for Security

June 18, 2024

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Security Guide Step 1: Consolidate and Clean Up Security Data

The first challenge is to consolidate and clean up data from many tools

June 17, 2024

No posts match this search!

Subscribe to AppSOC Blogs

Get weekly updates on industry news, thought leadership, and other security topics in your inbox.