cybersecurity

Generative AI Security: Insights from the OWASP Top 10 for LLM Applications

Generative AI Security: Insights from the OWASP Top 10 for LLM Applications

The Open Web Application Security Project (OWASP) has compiled the Top 10 for LLM applications as another list-style awareness document to provide a systematic overview of the application security risks, this time in the rapidly growing realm of generative AI. While everyone is aware of some of the risks related to large language models (LLMs), […]

Generative AI Security: Insights from the OWASP Top 10 for LLM Applications Read More »

Understanding the differences between Application Security and Development Security Operations

Understanding the differences between Application Security and Development Security Operations

You may have seen, especially on social media, many “expert” opinions on cybersecurity that freely mix and match seemingly unrelated terms. In the field of application security specifically, you will see people asking about things like the difference between AppSec and DevSecOps—a really strange thing to ask until you realize that in some contexts, people

Understanding the differences between Application Security and Development Security Operations Read More »

The Benefits of Using Predictive Risk Scoring for AI in Security

The Benefits of Using Predictive Risk Scoring for AI in Security

Invicti recently introduced its groundbreaking Predictive Risk Scoring feature, which can provide accurate security risk predictions even before vulnerability scanning starts. To learn more about Predictive Risk Scoring, visit our blog post here. This feature utilizes a custom-built machine learning model trained on real vulnerability data (not customer data) to estimate site risk levels and

The Benefits of Using Predictive Risk Scoring for AI in Security Read More »

Selecting the Appropriate Application Security Tools

Selecting the Appropriate Application Security Tools

Modern application security must be built in from the outset and reinforced continually throughout the software development lifecycle. Even organizations with mature application development practices need automated tools to successfully and repeatably secure their software in complex, fast-changing environments. Security leaders commonly focus on ensuring software security through runtime protection measures, with major cloud service

Selecting the Appropriate Application Security Tools Read More »

What is DevSecOps and how is it evolving?

The Evolution of DevSecOps: Understanding its Definition and Progress

DevSecOps is a software development approach that aims to integrate security practices into DevOps processes. Implementing DevSecOps efficiently requires organizations to make security an integral part of software quality by using automated security tools in their CI/CD pipeline. Crucially, the DevSecOps approach to software development offers a way to embed application security into the entire

The Evolution of DevSecOps: Understanding its Definition and Progress Read More »

The Popular Cybersecurity Framework Grows Up

The Popular Cybersecurity Framework Grows Up

The NIST cybersecurity framework has been a go-to resource for defining cybersecurity strategies, policies, and activities ever since version 1.0 was published back in 2014. Originally intended specifically for US companies operating critical infrastructure, it soon gained popularity across all industries and is used by CISOs worldwide. February 2024 saw the launch of version 2.0

The Popular Cybersecurity Framework Grows Up Read More »

The xz-utils backdoor: The supply chain RCE that got caught

The Supply Chain RCE That Was Exposed

Important Information   The xz-utils package in versions 5.6.0 and 5.6.1 contains a malicious backdoor that could potentially allow remote access to SSH sessions for remote code execution (RCE) on certain Linux systems under specific circumstances and configurations. It is recommended that all Linux users verify their xz-utils version is earlier than 5.6.0 and downgrade

The Supply Chain RCE That Was Exposed Read More »

Why DAST makes the perfect security posture gauge

The Key Benefits of Using DAST as a Security Posture Gauge

Focused on detection and response, security leaders might not think of DAST tools as an essential component of their AppSec toolbox. All too often, external vulnerability scanning is only performed during periodic third-party tests, giving you snapshots of your security posture that can be months out of date. What if you could run your own

The Key Benefits of Using DAST as a Security Posture Gauge Read More »