Note: This blog post below is written by AI. Certainly! Glog.AI is on a mission to make software more secure, and their approach is pretty fascinating. Let’s dive into it! Glog.AI focuses on application security—not as an afterthought, but as a fundamental requirement. In today’s interconnected world, where applications run on various devices and connect […]
Glog.AI is the name of the project in which we set the goal of making the software as secure as possible. Glog is Serbian language name for hawthorn. It is a plant whose flowers and fruits (Serbian: gloginje) help with many diseases, and at the same time strengthen immunity. With the name, we wanted to […]
Why do you need the strongest software security? Why do you need Glog.AI? Important drivers which you should consider for adoption are – you want/need to: Implement software security in software development lifecycle (SDLC). Prepare for audits for various security and privacy standards and regulations (e.g. ISO/IEC 27001, ISO/IEC 27034, ISO/IEC 5055, ISO/IEC 27701, NIST […]
We offer training on Artificial Intelligence for Cybersecurity and Software Security to our clients. Here is training preliminary content. First part: Introduction Demystifying artificial intelligence for cybersecurity Cybersecurity and software security goals, frameworks and gaps An approach to solving cybersecurity challenges with AI Applying machine learning to cybersecurity Practical considerations, risks and limitations How to […]
We offer training on Software & Application Security Training to our clients. Here is training preliminary content. Application Security SSA: Define and implement Software Security Assurance (SSA) program in your company Define Application and Software Security practice and ISMS (policies, standards, processes, guidance, tools) Integrate security into your Software Development Lifecycle (SDLC) Automate specific parts […]
Application security plays a crucial role in safeguarding against ransomware attacks, which can wreak havoc on an organization’s data and operations. It is done by implementing various measures to prevent unauthorized access and malicious activities within an organization’s applications. Here are some ways application security helps safeguard against ransomware. Let’s mention some initial steps to […]
We are proud that Geneva Manual recommends Glog.AI as result of Geneva Dialogue. The Geneva Manual is a comprehensive guide on non-state actors’ contributions to the implementation of cyber norms. Cyber norms are rules and principles that states have agreed to follow to ensure the security and stability of cyberspace. However, states are not the […]
Some of questions which you may (need to) ask your solution vendor when software security scanner and remediation solution is concerned: Do you know what the false positive rate of your solution is? Do you know what the false negative rate of your solution is? – Do not forget this one. 😊 Do you offer […]
President of USA signed Executive Order Charting New Course to Improve the Nation’s Cybersecurity and Protect Federal Government Networks. For our project, it is very important how it addresses Software Supply Chain Security. Our Glog.ai project is exactly about this as we are on mission of making software more secure. Here you can find fact […]