“Security Included”: Preventing Sensitive Data Leaks in the Software Supply Chain

eyal and tamar

Logs are an essential tool for developers, offering insights into application behavior, performance, and debugging processes. However, they also represent a critical security vulnerability if mishandled. A recurring issue plaguing the software supply chain is the inadvertent dumping of sensitive information, such as credentials and tokens, into log files. Despite being a well-documented bad practice, […]

Consolidation is king: How ASPM is transforming AppSec

Frame 1000005007

Is your sprawling AppSec toolset stopping threats or burning out staff and resources? Time for the ASPM diet… Cyber alert fatigue at the forefront In 1967, The Joint Computer Conference coined the term “penetration testing.” Four years later, Bob Thomas’s “Creeper” virus/worm demonstrated the possibilities of mobile code — and exposed vulnerabilities and flaws in […]

SAST vs SCA: Security tools that are better together

A graphic of OX Security mascot holding a magnifying glass to inspect code

Every line of code has the potential to be a security vulnerability. SAST and SCA tools help integrate security into the software development process and improve organizations’ security posture. Here’s how SAST and SCA tools work together – and why you need them.  Few software applications today are developed from scratch; in our world of […]

Context is king: what the next generation of AppSec tools is learning from SIEM

moosh on hoverboard

 Success breeds…confusion? AppSec teams face an average of 118,000 vulnerability alerts across their software supply chain. If even 1% of those are being exploited in the wild, finding – and triaging – them in a sea of noise is difficult at best.  Throw in multiple tools – on average, security teams need to monitor 129 […]