Application Security

Application Security

Best SAST Solutions: How to Choose Between the Top 11 Tools in 2025

Best SAST Solutions: How to Choose Between the Top 11 Tools in 2025 Static Application Security Testing (SAST) is a proactive approach to identifying security vulnerabilities in source code during development. This ...
LinuxFest Northwest 2025

LinuxFest Northwest: CentOS Mythbusters

Author/Presenter: Carl George (Principal Software Engineer, Red Hat) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest ...

Securing AI code at the source: Mend.io now integrates with Cursor AI Code Editor

Mend.io now integrates with Cursor to secure AI-generated code in real time ...
LinuxFest Northwest 2025

LinuxFest Northwest: My Journey Using Linux From Scratch And Why You Should Try It Too

Author/Presenter: Nathaniel Smith (Bellevue College, Baccalaureate Program Undergraduate In Computer Science) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their ...
ADR and Runtime Security are Reshaping AppSec as the Application Layer Becomes the Prime Target | IDC Northstar Research | Contrast Security

ADR and Runtime Security are Reshaping AppSec as the Application Layer Becomes the Prime Target | IDC Northstar Research | Contrast Security

In a new June 2025 research note, IDC highlights a major shift in how enterprises are thinking about Application Security (AppSec). The IDC Link Research Note covers Contrast Security’s Northstar release and ...
LinuxFest Northwest 2025

LinuxFest Northwest: Operating System Upgrades In A High Performance Computing Environment

Author/Presenter: Joe Ryan (High Performance Computing Systems Engineer, Institute for Cyber Enabled Research (ICER) at Michigan State University Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community ...
closing the loop on api security

Closing the Loop on API Security: How Imperva Helps You Expose, Contain, and Mitigate Business Logic Threats

In a world powered by APIs, waiting for an attack is waiting too long. Business logic risks like Broken Object Level Authorization (BOLA) don’t announce themselves with obvious signatures or malware. They ...
LinuxFest Northwest 2025

LinuxFest Northwest: Securing Your Web Server

Author/Presenter: Ted Matsumura (Board Director, Linux Professional Institute) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest ...
Steps to Tame Your Multi-Cloud Attack Surface

How to Tame Your Multi-Cloud Attack Surface with Pentesting

Let’s face it most organizations aren’t using just one cloud provider anymore. Maybe your dev team loves AWS. Your analytics team prefers GCP. And someone else decided Azure was better... The post ...
LinuxFest Northwest 2025

LinuxFest Northwest: GNU/Linux Loves All

Author/Presenter: Timmy Barnett (GNU Philosopher) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content ...