The Hype about ASPM—and the Dazz Unified Remediation Platform

|
Gartner’s Hype Cycle for Application Security, published a few weeks ago*, illuminates why Application Security Posture Management (ASPM) is transformational to cybersecurity, product security, and platform engineering teams, and features Dazz as a vendor in this fast-growing category. We’re honored to be recognized for our innovation in ASPM and proud ... Read More

CNAPP & ASPM: The Deadpool & Wolverine of Cybersecurity!

|
In the ever-evolving world of cybersecurity, tools and strategies constantly shift and adapt to emerging threats. Yet, among the sea of solutions, two stand out as a dynamic duo that's transforming how organizations approach security: Cloud Native Application Protection Platforms (CNAPP) and Application Security Posture Management (ASPM) solutions. Imagine them as ... Read More

Foster a DevSecOps culture where security is not a bottleneck, but an accelerator of secure software delivery

|
It’s Gartner Hype Cycle season and one of the first cycles out of the gate is the Hype Cycle for Operation Models, 2024 (which you can access here, if you are a Gartner subscriber.)According to Gartner analysts Neil MacDonald and Mark Horvath, “DevSecOps offers a means of effectively integrating security ... Read More
The GC on Cybersecurity: SEC disclosure rules, security challenges, and more with Dazz General Counsel Roni Sidi

The GC on Cybersecurity: SEC disclosure rules, security challenges, and more with Dazz General Counsel Roni Sidi

|
Roni SidiIt’s my pleasure to introduce our new General Counsel (GC), Roni Sidi! We caught up to discuss her role at Dazz, what she thinks about the SEC’s disclosure rules, and general challenges in the cybersecurity industry.Julie: Welcome to Dazz, Roni! What does a GC do?Roni: Thank you! That’s a ... Read More
6 surprising findings from the CSA State of Security Remediation Report

6 surprising findings from the CSA State of Security Remediation Report

|
The Cloud Security Alliance (CSA) released a new report providing insight into the challenges that security engineers and CISOs are facing in their remediation operations. Here are 6 key takeaways from their survey of 2,000+ practitioners.‍As more companies shift left and embrace hybrid cloud operations, the need for security visibility ... Read More

3 Ways Dazz Customers Experience Business Value

|
When IDC interviewed four Dazz customers last year to hear how our Unified Remediation Platform was delivering value to their organizations, the results were exciting. Customers cited a number of technology and business benefits such as the ability to get a single-pane-of-glass view of issues prioritized based on business risk ... Read More

Larry Trittschuh Joins as Dazz’s Newest Advisor

|
Today I’m thrilled to announce that Larry Trittschuh has joined us in an advisory role for Dazz, bringing 14+ years of board experience and 30+ years of leadership experience in mid- and large-cap companies in Financial Services, Technology, Healthcare, and Defense sectors.Most recently, Larry was Executive Vice President, Chief Security ... Read More

How to Make Your CNAPP Strategy Dazzle

|
Wondering how to make your CNAPP strategy dazzle? Here you go. Imagine you have shields that protect your cloud-native applications from all sorts of digital dangers. Well, they exist in reality, and are what Gartner calls Cloud-Native Application Protection Platforms, or CNAPPs for short.Now imagine your shields can talk (stay ... Read More

4 Key Takeaways from IDC’s business value paper on Dazz

|
The Wall Street Journal recently reported that security chiefs are looking for ways to cut costs and run operations more efficiently as economic challenges squeeze budgets. For many security chiefs — who have dozens of vendors handling everything from firewalls to email security — cutting the number of expensive services ... Read More
Challenges in modern cloud development with Steve Ward

The Top Problems with Vulnerability Remediation Today

|
As companies have transitioned development processes from building on-premises software to cloud applications, we’ve bled efficiencies—particularly at the intersection of development and security. When we design our cloud security infrastructure, the first thing we think we need is detection visibility into security issues. But we fail to consider the consequences: more ... Read More