What is API Rate Limiting?

API rate limiting maintains software availability. In this video, Jacob Garrison explains how different types of rate limiting affect software performance.

How to Approach Sensitive Data Discovery

Security teams are purpose-built to protect sensitive data. In this video, Jacob explains the three main approaches for discovering sensitive data in software.

Basics of Multi-Factor Authentication (MFA)

Authentication in software means you digitally identify yourself. In this video, Jacob Garrison explains how to combine the three primary authentication factors to ensure robust multi-factor authentication.

The Basics of SQL Injection (SQLi)

Preventing SQL injection is a fundamental part of coding securely. Jacob Garrison explains why SQL injection occurs and the steps you must take to prevent it.

Different Injection Attacks to Defend Against

According to OWASP, Injection is an attacker’s attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter.

In this video, Jacob Garrison introduces injection attacks, as well as the different injection attacks you should defend against.

 

Local Storage Manipulation with Broken Access Control

LocalStorage allows developers to include information within the browser that’s needed at later points in time. This data is typically stored in plaintext format – and it introduces some issues.

Below is an example of our very own Jacob Garrison walking through localStorage manipulation.

 

To learn more, check out our blog about mitigating the dangers of single-page applications (SPAs).

Measuring Risk in Production w/ ASPM

In this series of videos, Jacob Garrison walks through measuring risk in production: why do it, stakeholders, and how to do it with Bionic.

 

Why Measure Risk in Production

Who Measures Risk in Production

How ASPM Helps You Measure Risk in Production

 

To learn more about Bionic, book a demo with an expert today.

Data States: At Rest, In Transit, and In Use

In security, you should know about three data states: at rest, in transit, and in use. Check out the video to learn more.

 

To learn more about Bionic, book a demo with an expert today.

Cross-Environment Contamination

What happens when you store data in the wrong environment? Nothing good.

Check out this video to learn:

  • Why separating real and mock data is crucial
  • One common mistake that leads to data contamination

 

Be sure to check out how ASPM can help solve cross-environment contamination below.

 

To learn more about Bionic, book a demo with an expert today.

How ASPM Helps w/ Data Privacy

Because ASPM understands the full architecture of applications, it is very useful for data privacy and data security.

To learn more about Bionic, book a demo with an expert today.

Risk Scoring w/ Microservices Applications

When looking at risk scoring, the first thing you need to consider is threats. These are the things that people use to break into the system. These are the common attack vectors that we’re familiar with.

Next, you factor in the exploitability or the accessibility of that service, so if this is a service that has a public-facing IP address, it is a lot more accessible than a service that only has internal connections.

Finally, you need to factor in the criticality of what that service is accessing.

Check out the rest of this video to learn more.

 

In the next video, Jacob walks through how Bionic ASPM scores risk.

 

To learn more about Bionic, book a demo with an expert today.

Security Return on Investment

In this video, Jacob Garrison walks through how to calculate a return on investment in your security program.

 

To learn more about Bionic, book a demo with an expert today.

Cryptography

Tokenization, encryption, and hashing. Three encryption methods that you should learn about. Check out the video below to learn more.

To learn more about Bionic, book a demo with an expert today.

Innovation Insight for Application Security Posture Management

Gartner recently released its first-ever Innovation Insight for Application Security Posture Management (ASPM). Check out our very own Jacob Garrison’s insights on the ASPM market.

To learn more about Bionic, book a demo with an expert today.

CrowdStrike Bionic

Have you heard the news?

Bionic to be acquired by CrowdStrike to provide the industry’s most comprehensive cloud security platform. Together, we are creating the industry-defining cloud security platform, fully integrated from code to runtime.