Syndicated Blog

The Dazz Blog blog
Welcome to our blog about all things in and around the world of APIs and API security.

New Dazz Connections – September 2024

|
We’re constantly adding new integrations to help connect the dots between the development, infrastructure, and security tools you know and love to provide unparalleled visibility into your security environment for easier remediation. Here ...
How we improved vulnerability prioritization with machine learning

How we improved vulnerability prioritization with machine learning

|
It’s easy to find vulnerabilities. It’s harder to prioritize and fix them. So far in 2024, there has been an average of over 110 CVEs disclosed per day. Compounded with all the vulnerabilities ...

10 fast facts about cybersecurity for financial services—and how ASPM can help

|
It should shock no one that financial services organizations are a major target for cybercrime. In fact, according to the World Economic Forum, financial organizations are the number 2 target, “accounting for ...

Windows IPv6 TCP/IP RCE CVE-2024-38063: What is it & What do I do?

|
What are we talking about?Microsoft’s latest Patch Tuesday released an advisory about CVE-2024-38063, a TCP/IP vulnerability in the Windows operating system.What that means is the vulnerable component in Windows is actually the ...

The Hype about ASPM—and the Dazz Unified Remediation Platform

|
Gartner’s Hype Cycle for Application Security, published a few weeks ago*, illuminates why Application Security Posture Management (ASPM) is transformational to cybersecurity, product security, and platform engineering teams, and features Dazz as ...

CNAPP & ASPM: The Deadpool & Wolverine of Cybersecurity!

|
In the ever-evolving world of cybersecurity, tools and strategies constantly shift and adapt to emerging threats. Yet, among the sea of solutions, two stand out as a dynamic duo that's transforming how ...
Rowing the Same Direction: Tips for Stronger IT and Security Collaboration (Tip #1)

Rowing the Same Direction: 6 Tips for Stronger IT and Security Collaboration

|
The Olympians make it look easy, but make no mistake: rowing is a more difficult sport than meets the eye. Changing conditions in the water and weather, exhaustion, and even a head tilt ...

Why It’s Time to Fuse Application and Data Security

|
The average security team has invested heavily in Application and Data Security, yet these initiatives can often be disjointed. Applications act as the gateways to your data ecosystem. Hackers relentlessly probe these ...

Doubling down on AI-powered cloud security remediation

|
This past week we announced an exciting milestone that will fuel our mission to simplify cloud security remediation and help security and engineering teams fight AI with AI. All of our initial ...

Elevating Application Security Beyond “AppSec in a Box”

|
In the ever-evolving landscape of application security, traditional "AppSec in a box" solutions, which bundle static analysis (SAST), software composition analysis (SCA), secrets detection, API security, and other code analysis tools, have ...

Application Security Check Up