Filter & Sort
  1. ASPM is for Everyone

    ASPM isn't just for security teams anymore! Discover why developers are the new frontline in AppSec and how Checkmarx is bringing powerful Application Security Posture Management (ASPM) directly into their IDEs, unifying insights and focusing on exploitable risks for friction-free, AI-powered security.

  2. API Security Testing: What it is, Why it Matters

    APIs power modern applications but also expose critical vulnerabilities that attackers often exploit. This article explores why API security testing is essential, how breaches like MOVEit happened, and what organizations can do to protect their APIs. It also highlights the differences between REST, SOAP, and GraphQL security, and how tools like OX Security help ensure complete visibility and protection across the API landscape.

  3. OX Security: Empowering Executives with Actionable AppSec Insights

    Application security isn’t just a technical concern — it’s a business priority. OX Security’s enhanced executive reports help bridge the gap between AppSec teams and leadership by turning complex security data into clear, actionable business insights. With high-level summaries, dynamic visualizations, and tailored risk analysis, these reports empower executives to prioritize security investments and align AppSec strategies with business goals.

  4. The use of AI has become the expectation, Are you keeping up?

    Is AI truly reflexive in your company? Discover why saying "no" to AI multiplies risk and how secure, owned AI solutions like Civo's relaxAI can boost productivity, improve decision quality, and transform your organizational culture, ensuring your teams harness AI without sacrificing control or compliance.

  5. Is AI already replacing me? Insights from Civo Navigate

    Are you keeping up with AI's rapid evolution? Dive into key takeaways from Civo Navigate, exploring multimodal AI, agentic systems, and anomaly detection. Discover how AI is augmenting, not replacing, humans, the impact of open-source models, and the crucial debate on responsible AI adoption.

  6. Master API security: Securing your entire API ecosystem with Beagle Security’s API discovery

    Discover how unchecked API sprawl creates critical security blind spots for fast-growing fintech startups, leading to data breaches and operational inefficiencies. Learn how Beagle Security's API discovery feature automatically uncovers and tests all APIs within Kubernetes or Istio environments, ensuring complete visibility and proactive vulnerability management.

  7. How much does pen testing cost (2025)

    Explore the true costs of penetration testing in 2025, breaking down pricing by scope (web, mobile, API, cloud, network, IoT) and methodology (black box, grey box, white box). Discover key factors influencing costs and learn how AI-powered solutions like Beagle Security offer a faster, more affordable alternative to traditional pen tests.

  8. From Minecraft to Kubernetes Security: The Founding Story of Edera with Alex Zenla

    Discover Alex Zenla’s journey from Minecraft and IoT to Kubernetes security. Learn how Edera is redefining container isolation for secure, efficient cloud-native infrastructure.

  9. PostgreSQL® extensions you need to know in 2025

    Uncover the pivotal role of PostgreSQL's extensions ecosystem, its historical context, and why it remains indispensable for modern data needs, including AI and analytics. Dive into key extensions like TimescaleDB, PostGIS, and pgvector, and learn how a managed service, like Aiven, mitigates risks and enhances reliability.

  10. Rails debug mode enabled

    Uncover the critical security risks of running Ruby on Rails in development mode on a live server, from exposing internal workings and sensitive information to increasing the risk of remote code execution and DoS attacks. Learn practical steps to safeguard your application and prevent these vulnerabilities.

  11. How to store and secure sensitive data in web applications

    Given the surge in web application data breaches, learn how to effectively store and secure sensitive data in your web applications. This article explores critical data types, client-side and server-side storage mechanisms, common OWASP Top 10 vulnerabilities, and essential protective measures like robust authentication, access control, and encryption strategies.

  12. How PerfectScale Helps a DevOps Team of One Scale Riftweaver

    Discover how Riftweaver, an innovative gaming studio with a one-person DevOps team, leveraged PerfectScale to reduce CPU throttling by nearly 59% in critical APIs, improve user experience, and enable efficient scaling of their AWS EKS Kubernetes environment, even on a free plan.

Items 97 to 108 of 328 total

Show per page