Blog

Application Security Posture Management (ASPM)

Application Security Posture Management (ASPM) is a comprehensive approach to managing and improving the security of an organization’s applications. It involves: Evaluating the security stance of custom applications. Managing adherence to security standards. Enhancing resistance to cyber threats and ensuring compliance. ASPM tools help identify vulnerabilities, assess risks, and prioritize mitigations. This enables organizations to […]

Training on Artificial Intelligence for Cybersecurity and Software Security

We offer training on Artificial Intelligence for Cybersecurity and Software Security to our clients. Here is training preliminary content. First part: Introduction Demystifying artificial intelligence for cybersecurity Cybersecurity and software security goals, frameworks and gaps An approach to solving cybersecurity challenges with AI Applying machine learning to cybersecurity Practical considerations, risks and limitations How to […]

Software & Application Security Training

We offer training on Software & Application Security Training to our clients. Here is training preliminary content. Application Security SSA: Define and implement Software Security Assurance (SSA) program in your company Define Application and Software Security practice and ISMS (policies, standards, processes, guidance, tools) Integrate security into your Software Development Lifecycle (SDLC) Automate specific parts […]

How does application security protect against ransomware?

Application security plays a crucial role in safeguarding against ransomware attacks, which can wreak havoc on an organization’s data and operations. It is done by implementing various measures to prevent unauthorized access and malicious activities within an organization’s applications. Here are some ways application security helps safeguard against ransomware. Let’s mention some initial steps to […]

How Glog.AI can help remediation of software security vulnerabilities?

Software security vulnerabilities are coding flaws or system misconfigurations that can be exploited by attackers to compromise the confidentiality, integrity, or availability of your software applications. They can cause serious damage to your business, such as data breaches, reputation loss, legal liability, or financial losses. Therefore, it is essential to identify and fix software security […]

Glog.AI Resolver

Glog Resolver is part of Glog Solution which in communication with Glog Server discovers context of source code that is analyzed and performs context specific triage and remediation. Glog Resolver is executed on the client side, where it analyzes source code and prepares data to be sent to Glog Server. Based on analysis results provided […]

GenAI code generators and software security

There are number of articles and reports about Copilot and similar AI code assistants as well as articles and analysis about security of code developed that way. Here is attempt to summarize some of conclusions: GenAI code generators speed up development and increase productivity especially among junior and medior, but also senior developers. They introduce […]

Glog.AI Server

Glog.AI Server is a central place to store all needed data and to execute different AI tasks. The server is a key component to perform application onboarding together with Threat Model integration, triage process by utilizing code language models to predict method behavior and detected validation routines, and to provide context specific remediation advice for each […]

Geneva Manual recommends Glog.AI

We are proud that Geneva Manual recommends Glog.AI as result of Geneva Dialogue. The Geneva Manual is a comprehensive guide on non-state actors’ contributions to the implementation of cyber norms. Cyber norms are rules and principles that states have agreed to follow to ensure the security and stability of cyberspace. However, states are not the […]

Why and how did we create Glog.AI?

In our Glog.AI solution, we focused on real exploitable security vulnerabilities in software code and very precise remediation advice based on context. We have worked on this because, based on more than decade of application security practice, the conclusion was that most of the tools on the market report too many potential vulnerabilities, which developers […]