AppSOC Blog

Read posts from security experts on a wide range of topics or watch out Blog Videos

Follow us on LinkedIn

Get our Newsletter

Subscribe
Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Customer POV

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Customer POV Part 1: The Need for Cyber Risk Governance

We have to fully understand the risks that cyberattacks pose to the business

July 12, 2024

min read

Security Best Practices

Application Security (ASPM)

The Crucial Role of Application Security Engineers in Cybersecurity

Application security engineers protect critical applications against threats

July 10, 2024

min read

Partnerships

Industry News

Software Supply Chain

AppSOC Partners with JFrog to Secure Software Supply Chains

Combines power of JFrog Xray with AppSOC ASPM

July 9, 2024

min read

AI Security

Governance & Compliance

Understanding the MITRE ATLAS Matrix for AI Threats

Adversarial Threat Landscape for AI Systems applies ATT&CK methodology

July 3, 2024

min read

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Security Guide Step 2: Correlate Findings Across Tools and Sources

Consolidating data is a good first step, but now you need to connect the dots

July 2, 2024

5 min read

Application Security (ASPM)

Vulnerability Management

Application Security Posture Management Strengthens Your Vulnerability Strategy

ASPM provides continuous monitoring and improvement of overall application security

June 26, 2024

min read

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Granular Filters Make Security Data Easier to Understand

Bringing together thoughtfully designed dashboards with granular and flexible filter

June 20, 2024

min read

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Why Deduplication is Important for Security

Why Deduplication is Important for Security

June 18, 2024

min read

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Security Guide Step 1: Consolidate and Clean Up Security Data

The first challenge is to consolidate and clean up data from many tools

June 17, 2024

min read

Application Security (ASPM)

Vulnerability Management

Security Best Practices

Contextual Risk Scoring: A Smarter Approach to Prioritizing Security Issues

We all know we need to prioritize but for security analysts this is not always easy

June 13, 2024

min read

Governance & Compliance

Security Best Practices

Essential Operational Risk Management in App Security

Identifying, assessing, and mitigating risks that could disrupt business operations

June 11, 2024

min read

Application Security (ASPM)

Governance & Compliance

Application Security: Risk Management Strategies

Risk management is essential for effective vulnerability prioritization

June 6, 2024

min read

No posts match this search!