We offer training on Software & Application Security Training to our clients. Here is training preliminary content. Application Security SSA: Define and implement Software Security Assurance (SSA) program in your company Define Application and Software Security practice and ISMS (policies, standards, processes, guidance, tools) Integrate security into your Software Development Lifecycle (SDLC) Automate specific parts […]
Application security plays a crucial role in safeguarding against ransomware attacks, which can wreak havoc on an organization’s data and operations. It is done by implementing various measures to prevent unauthorized access and malicious activities within an organization’s applications. Here are some ways application security helps safeguard against ransomware. Let’s mention some initial steps to […]
Software security vulnerabilities are coding flaws or system misconfigurations that can be exploited by attackers to compromise the confidentiality, integrity, or availability of your software applications. They can cause serious damage to your business, such as data breaches, reputation loss, legal liability, or financial losses. Therefore, it is essential to identify and fix software security […]
Glog Resolver is part of Glog Solution which in communication with Glog Server discovers context of source code that is analyzed and performs context specific triage and remediation. Glog Resolver is executed on the client side, where it analyzes source code and prepares data to be sent to Glog Server. Based on analysis results provided […]
There are number of articles and reports about Copilot and similar AI code assistants as well as articles and analysis about security of code developed that way. Here is attempt to summarize some of conclusions: GenAI code generators speed up development and increase productivity especially among junior and medior, but also senior developers. They introduce […]
Glog.AI Server is a central place to store all needed data and to execute different AI tasks. The server is a key component to perform application onboarding together with Threat Model integration, triage process by utilizing code language models to predict method behavior and detected validation routines, and to provide context specific remediation advice for each […]
We are proud that Geneva Manual recommends Glog.AI as result of Geneva Dialogue. The Geneva Manual is a comprehensive guide on non-state actors’ contributions to the implementation of cyber norms. Cyber norms are rules and principles that states have agreed to follow to ensure the security and stability of cyberspace. However, states are not the […]
In our Glog.AI solution, we focused on real exploitable security vulnerabilities in software code and very precise remediation advice based on context. We have worked on this because, based on more than decade of application security practice, the conclusion was that most of the tools on the market report too many potential vulnerabilities, which developers […]
Some of questions which you may (need to) ask your solution vendor when software security scanner and remediation solution is concerned: Do you know what the false positive rate of your solution is? Do you know what the false negative rate of your solution is? – Do not forget this one. 😊 Do you offer […]
“Secure” computer systems get hacked all the time. We live in a world where very few systems are truly safe (if any), and proving that a system is secure is challenging or next to impossible. Unlike most of others, Glog.AI has a research leg which comes from the perspective of using math to prove software […]