CNAPP and ASPM — Friends or Foes?
The backstories of AppSec and cloud security In an industry that moves so quickly and pivots so frequently, it’s easy to forget that the term and discipline of application security (AppSec) emerged in the late 1990s and early 2000s. Driven by what was considered rapid web application growth at the ... Read More
Using OSC&R and ASPM to Perform a Digital Learning Loop with Agentless ADR
Digital Learning Loops (DLLs) are gaining attention for their role in continuously enhancing processes through iterative learning and feedback. In application security (AppSec), a DLL initiates by collecting data from various security processes and system interactions. How a DLL works in AppSec In application security (AppSec), a Digital Learning ... Read More
Five Gartner Reports. Four Categories. What Does OX Security Do Anyway?
Analyst firms play an important role in the tech vendor landscape. Their reports help buyers and would-be buyers learn about vendors and their offerings. In cybersecurity, in particular, buyers use analysts’ outputs to build shortlists prior to thee kick-offs of their individual deep dive evaluations — in some categories of ... Read More
How ASPM Solutions Help Organizations Prepare for the EU’s DORA
The European Union’s Digital Operational Resilience Act (DORA), passed in late 2022, is set to take full effect by early 2025. DORA establishes new cybersecurity standards for financial institutions operating and doing business in the European Union (EU), given their heavy reliance on information and communications technology (ICT). Recognizing the ... Read More
What Is Application Detection and Response (ADR)?
Application detection and response (ADR) is an emerging cybersecurity category that focuses on application visibility, protection, and remediation. ADR is a comprehensive and proactive approach to application security that incorporates automation, prioritization, contextual analysis, and allows security and development teams to facilitate enhanced threat detection and incident response. The cybersecurity ... Read More
A Top-Ten List You Don’t Want to Be On
OX Research Maps Most Common Supply Chain Vulnerabilities to Attacker TTPs For our recent threat research report, OSC&R in the Wild: A New Look at the Most Common Software Supply Chain Exposures, we analyzed over 100,000,000 software supply chain alerts and mapped the most serious vulnerabilities to OSC&R, the first-of-its-kind ... Read More
The Essential Role of Multi-Layered Defense and Role Based Access Control: OX Security’s Enhanced RBAC Functionality
Many debates have been started about where to put the first layer of defense in cybersecurity. Do you start at the network layer? At the data layer? On the endpoint? Around the application? The reality is that cybersecurity isn’t an “either/or.” The only suitable solution for cybersecurity efficacy and resilience ... Read More
Empower Your Developers with Software Supply Chain Security
Gartner names OX Security as representative vendor in Emerging Tech Impact Radar: DevOps report The historical friction between software developers and cybersecurity teams is a thing of legend. Developers are traditionally focused on building new applications and updating production applications with cutting-edge features and functionality while ensuring they’re meeting tight ... Read More
Understanding Your IT Dependencies: Unpacking the Crowdstrike Windows Outage
Happy almost weekend, everybody…or, not, if you’re in IT…or trying to travel…or get medical attention…or just get your work done and start the weekend off with a bang… Many of us have woken up to the news of a massive global outage caused by a Crowdstrike Falcon endpoint sensor update ... Read More
Three Ways Ox Security Helps You Achieve FedRAMP
Compliance mandates are a fact of life for security teams. There is no shortage of rules and regulations businesses must meet to certify that their organizations are architecting to specified standards for data handling, access controls, testing and auditing, and so much more. Over the years, cybersecurity teams have bemoaned ... Read More