Security Orchestration Automation and Response (SOAR) | Uleska
Uleska Blog
by Gary Robinson
1y ago
Security teams frequently struggle with the volume of alerts and issues they are tasked with daily. On average, most enterprises receive between 10,000 and 150,000 a day. Regardless of how large a security team may be, manually going through alerts like this is an almost impossible task ..read more
Visit website
Open Source Security Testing Tools
Uleska Blog
by Gary Robinson
1y ago
Security tools are an essential part of software development today, especially with the ever-increasing number of attacks we see every year. According to Check Point Research, we saw 50% more attacks per week on corporate networks than the previous year. Therefore, utilising open source security tools can be a massive benefit to any organisation ..read more
Visit website
Application Security Orchestration & Correlation | Uleska
Uleska Blog
by Gary Robinson
1y ago
Application Security is a constantly evolving industry, with new threats and methods to combat them appearing regularly. One of the more recent methodologies to combat these threats is Application Security Orchestration and Correlation (ASOC), which centralises these different technologies and integrates them at all development points ..read more
Visit website
Secure Software Development Life Cycle (SSDLC) | Uleska
Uleska Blog
by Gary Robinson
1y ago
Software development has evolved into an incredibly complex machine, with several moving parts to keep track of. Teams get more extensive, and software systems become more complicated as time goes on. Consequently, it has become essential for organisations to structure and plan the road to a final product ..read more
Visit website
How to improve security tool selection and customisation with Uleska Toolkits
Uleska Blog
by Raquel Soares
1y ago
We know starting your application security (AppSec) journey can be a little overwhelming. After all, choosing your tools from scratch and setting yourself up for scalable security assurance has been a challenge. Until now ..read more
Visit website
Top 5 AppSec Productivity Hacks 2022
Uleska Blog
by Jamie Graves
1y ago
The application security (AppSec) industry moves fast. Development, security and operations (DevSecOps) practitioners are having to find creative approaches to drive productivity, efficiency and enhanced security across software development ..read more
Visit website
Vulnerability Assessments in Application Security | Uleska
Uleska Blog
by Raquel Soares
1y ago
Did you know that over 79% of developers surveyed in 2020 stated their applications had 20 or more vulnerabilities on average? As the digital world evolves, so to do its inhabitants. Cyber security attacks are higher than ever, and application security is quickly becoming more and more important with each passing day ..read more
Visit website
What is Application Security? A Beginner’s Guide | Uleska
Uleska Blog
by Raquel Soares
1y ago
What is Application Security? Application Security is defined by developing, adding, and testing security features in an application or website. Taking these measures can prevent hostile attacks from malicious users and stop sensitive data or systems from being exposed ..read more
Visit website
Toolkits: Taking the guesswork out of security tool selection and customisation
Uleska Blog
by Gary Robinson
1y ago
There are thousands of amazing AppSec tools out there, but this can be both a blessing and a curse. While the headway and innovation we are seeing across these kinds of tools signal big things for the DevSecOps industry, it’s nothing short of a pain when it comes to configuration, deployment and introducing new tools into the mix.  Keeping pace with continuous delivery, changes in technology and security requirements means that attempting to manually copy a configuration across dozens (and sometimes hundreds!) of applications is an almost impossible feat ..read more
Visit website
What is Vulnerability Management? | Uleska
Uleska Blog
by Raquel Soares
1y ago
No system is perfectly secure, as proven by software analysis firm CAST, which reviewed 278 million lines of code and discovered more than 1.3 million vulnerabilities caused by errors and poor code practices. Because of this, organisations should have a plan of action (known as Vulnerability Management) on how to handle these vulnerabilities ..read more
Visit website

Follow Uleska Blog on FeedSpot

Continue with Google
Continue with Apple
OR