What Exactly Is Application Security Posture Management?
For security leaders looking for a more modern approach to improve their application security posture and better manage enterprise risk, enter application security posture management, or ASPM. “Application security posture management analyzes security signals across software development, deployment, and operation to improve visibility, better manage vulnerabilities, and enforce controls, according ... Read More
How ASPM Can Help with Software Supply Chain Security
Application security posture management (ASPM) aims to change the conversation and strategy around software supply chain security. Application portfolios are growing significantly, which is creating headaches for security teams that are responsible for identifying and remediating vulnerabilities flagged in applications. Meanwhile, some of these applications may have been created without ... Read More
Move over Traditional AppSec: Here Comes Application Security Posture Management
A new Rezilion guide examines the growing trend toward the use of Application Security Posture Management (APSM), which aims to make applications secure and resilient, in turn, significantly reducing business risk. The paper explores the business drivers for ASPM, how ASPM works, what ASPM tools are designed to do, and ... Read More
How Generative AI Can Enhance Software Supply Chain Security
Generative AI is the technology of the moment, and is actually being hyped as providing transformational benefits for years to come, including when it comes to software supply chain security. This subset of AI uses machine learning algorithms to generate new data and content. Given the increasing importance of the ... Read More
What Can Happen If You Don’t Address Software Supply Chain Security Issues?
By now we know that software supply chain security issues are plentiful. And perhaps you’ve (wisely) decided that it’s a good idea to secure your software supply chain…you just haven’t gotten around to dealing with it yet, given other organizational priorities. The more software you use, the more important it ... Read More
Products for Software Supply Chain Security
As CISOs and CSOs craft or broaden their software supply chain security programs, they will be faced with an overwhelming number of tools in a variety of categories. Even with product consolidation, it may be confusing to figure out what they need in their tech stack. It’s no wonder–the software ... Read More
The Cost of a Data Breach Reaches an All-Time High
Like most things in life, the cost of a data breach has gone up, reaching an all-time high of $4.45 million—a 2.3% increase over last year’s cost, according to IBM’s newly-released Cost of a Data Breach 2023 report. In the firm’s 2020 report, the average cost was $3.86 million, a ... Read More
More Black Hat 2023 Conference Highlights
The five-day-long Black Hat 2023 conference includes so many noteworthy sessions, in addition to our first blog, we decided to take an in-depth look at some additional ones. One of these is a discussion about whether decentralized identity—a hot topic these days—is hype or reality. In a session Tuesday, Aug ... Read More
Must-See Sessions at the Black Hat USA 2023 Conference
Premier cybersecurity conference Black Hat USA 2023 is coming up in a few weeks, making this a good time to take a look at some of the highlights. The conference will run from Aug. 5-10 in Las Vegas. Not surprisingly, AI is a huge theme at this year’s conference, making ... Read More
Why Developers Need a Security Mindset (And How to Help Them With It)
It’s never been a more important time for developers to have a security mindset. Software developers are increasingly relying on open source components in their products. While this makes their jobs somewhat easier, open source is prone to vulnerabilities. It’s no secret that developers often find it challenging to prioritize ... Read More