Jamie Gale

All Stories by Jamie Gale

  • Today, we’re pleased to announce that we’re being acquired by cybersecurity leader CrowdStrike to amplify and extend their cloud security capabilities to the application layer. Together, CrowdStrike and Bionic will help customers manage security and business risk that comes with two of the greatest challenges in technology: ephemeral, cloud-native services and highly dynamic, rapidly changing […]

  • Here at Bionic, we continue to push the boundaries of what’s possible to help our customers secure their cloud-native applications. Today, we’re announcing a direct integration with ServiceNow, Bionic Events, and a reimagined dashboard. These updates supercharge the state of application security posture management and help you achieve unprecedented visibility into and continuous control over […]

  • API security isn’t a checkbox. Security teams must create a multi-faceted API security approach that scales with the velocity of development teams. With API attacks up 400% this year, it’s no wonder that building a comprehensive API security program is a top priority for modern enterprises. In this article, we’ll detail the necessary components of […]

  • As the industry’s first ASPM solution, we are fully committed to helping security and engineering teams manage risk effectively and efficiently. Today, we are announcing Bionic Signals and Business Risk Scoring. These capabilities help engineers correlate and contextualize security signals so they can rapidly prioritize and resolve business risk. Bionic Signals   Bionic ingests data […]

  • Gartner recently released its first-ever Innovation Insight for Application Security Posture Management (ASPM).  What is ASPM? If you’re new to the topic, Gartner provides the following definition.  Application security posture management analyzes security signals across software development, deployment and operation to improve visibility, better manage vulnerabilities and enforce controls. Security leaders can use ASPM to […]

  • Data is information. So a Chief Information Security Officer should be responsible for securing data, right? And while securing data is definitely a team sport that spans across engineering, DevOps, product, security, GRC, and other departments, it’s often the CISO who is up at night, worrying about potential data breaches, exorbitant fines, legal implications, and […]

  • Protecting sensitive or personal data of employees and customers is one of – if not the – most important responsibility of any business. While most of the world is adopting data protection laws, there are misconceptions about who needs to comply with which regulations and what information or data is actually covered.  The first step […]

  • Today, we’re pleased to announce a partnership with the industry leader in cloud security, Wiz to provide next-generation Cloud and Application Security. The Wiz + Bionic partnership will help customers manage security and business risk that comes with two of the greatest challenges in technology: ephemeral, cloud-native services and highly dynamic, rapidly changing applications in […]

  • Shifting left is proven to help DevSecOps teams create more secure applications by earlier inclusion of security testing practices in the application development lifecycle and CI/CD pipeline. The Cloud Security Alliance estimates that about 90 percent of organizations are in various stages of adopting DevSecOps. IBM’s 2022 Cost of a Data Breach report notes that, among […]

  • Today we’re talking about CVE-2022-42889 aka Text4Shell. We’ll walk you through what it is, what you need to know and do to protect your applications, and dive into how Bionic is helping customers understand their overall risk related to this vulnerability. What is Text4Shell? Text4Shell is a vulnerability within the widely used Apache Commons Text […]

  • Companies innovate through applications to reach new customers and markets with greater speed. This blog discusses what applications were, how applications have evolved, and why Application Security Posture Management (ASPM) is a must-have for organizations that run modern apps in the cloud.  What was an Application? Before we get into modern applications, let’s take a […]

  • Many security solutions assign numerical scores to indicate the risk that a threat poses so that customers can prioritize which issues to fix first. Teams work through endless tickets, trusting blindly that the assigned score accurately represents the (business) risk that a threat poses.  If all risk scores were created equal (and accurate), then this […]

  • Over the last several years, targeted, “boutique” cloud security solutions have consolidated into one-stop shops, known as Cloud-Native Application Protection Platforms (CNAPPs).  This blog discusses the evolution of the CNAPP and its predecessors: Cloud Access Security Broker (CASB) Cloud Workload Protection Platform (CWPP) Cloud Security Posture Management (CSPM) Cloud Infrastructure Entitlement Management (CIEM). We’ll then […]