Skip to content
GoSentrix

Application Security

91 posts in this category

An actionable guide to embedding security into every phase of software delivery

In this article, we'll look at the emergence of DevSecOps and then discuss actionable best practices for integrating DevSecOps into your workflows.

GoSentrix Security Team
Application SecuritySecurity Best Practices

Buffer Overflow 2.0: Modern attacks and cloud security

A buffer overflow is a memory corruption vulnerability that allows threat actors to execute malicious code and take control of a program

GoSentrix Security Team
Application Security

Application security engineer job description

An application security engineer is a security professional who protects software applications from threats throughout the entire development process.

Wiz Experts Team
Application Security

Source Code Security: Basics and Best Practices

Source code security refers to the practice of protecting and securing the source code of an application from vulnerabilities, threats, and unauthorized access.

Wiz Experts Team
Application Security

Guide to Standard SBOM Formats

Two major formats dominate the SBOM ecosystem: Software Package Data Exchange (SPDX) and CycloneDX (CDX). Let's review!

Wiz Experts Team
Application Security

What is Secrets Management? Best Practices & Tools

Secrets management is the practice of securely storing, controlling access to, and managing digital credentials like passwords, API keys, and certificates.

Wiz Experts Team
Application Security

Source Code Leaks: Risks, Examples, and Prevention

In this blog post, we'll explore security measures and continuous monitoring strategies to prevent these leaks, mitigating the risks posed by security vulnerabilities, human error, and attacks.

Wiz Experts Team
Application Security

What is a memory leak? Detection and prevention guide

A memory leak is when a program allocates memory but never releases it back to the system. This means your computer gradually runs out of available memory, like borrowing books from a library but never returning them.

Wiz Experts Team
Application Security

8 Essential Code Review Best Practices

Code review is a software development practice where code is systematically examined to ensure it meets specific goals, including quality and security standards.

Wiz Experts Team
Application Security

CSPM vs. ASPM: What's the difference?

Let's take a closer look at CSPM and ASPM to see what protection they offer, key differences, and use cases.

Wiz Experts Team
Application Security

What Code Security Is (and Best Practices to Improve Yours)

Learn what code security is and the challenges of ensuring it in 2025 and beyond. More importantly, discover techniques and best practices to secure your code.

Wiz Experts Team
Application Security

What Is Cross-Site Request Forgery (CSRF)? Examples, Vulnerabilities, and Prevention

Cross-site request forgery (CSRF), also known as XSRF or session riding, is an attack approach where threat actors trick trusted users of an application into performing unintended actions.

Wiz Experts Team
Application Security

What is Software Supply Chain Security and How to Master It?

Master software supply chain security by learning best practices like proactive risk management, real-time monitoring, and more to prevent breaches.

Wiz Experts Team
Application Security

What is Code-to-Cloud Security?

Code-to-cloud security protects applications across the entire software development lifecycle (SDLC), from code all the way to runtime in the cloud.

Wiz Experts Team
Application Security

What is Security by Design?

Security by design is a software development approach that aims to establish security as a pillar, not an afterthought, i.e., integrating security controls into software products right from the design phase.

Wiz Experts Team
Application Security

Best code analysis tools in 2025

This post will explore the top 10 code security platforms to see just how well they secure modern cloud-native applications.

Wiz Experts Team
Application SecurityTools

GitOps vs. DevOps: How GitOps Keeps You Aligned

While DevOps delineates collaboration and automation practices that emphasize infrastructure provisioning and continuous monitoring, GitOps extends its concepts by employing Git as the single source of truth for both application and infrastructure settings.

Wiz Experts Team
Application Security

The Top 28 Open-Source Code Security Tools: A 2026 Guide

Discover the top open-source security tools for cloud security. This guide covers the pros and cons and explains how a scanner fits into your security stack.

Wiz Experts Team
Application Security
The OWASP Top 10: 2025 Is Coming — And It Will Redefine How You Build Secure Software

The OWASP Top 10: 2025 Is Coming — And It Will Redefine How You Build Secure Software

GoSentrix Security Team
Application SecuritySecurity Best Practices

MIT Licenses Explained

The MIT License is widely adopted because it provides a straightforward framework with minimal restrictions, allowing free use, modification, and distribution.

Wiz Experts Team
Application Security

What is Application Detection and Response (ADR)?

Application detection and response (ADR) is an approach to application security that centers on identifying and mitigating threats at the application layer.

Wiz Experts Team
Application Security

What are Application Security Frameworks?

Application security frameworks are essential guidelines, best practices, and tools designed to help organizations stay consistent in their security practices, meet compliance requirements, and effectively manage risks associated with application security.

Wiz Experts Team
Application Security

Secrets Detection: A Fast-Track Guide

Secrets detection is the process of identifying and managing sensitive information like API keys, passwords, and tokens within codebases to prevent unauthorized access and data breaches.

Wiz Experts Team
Application Security

11 DevSecOps Tools and The Top Use Cases in 2025

Learn how DevSecOps integrates security into development, enhances collaboration, and ensures secure software delivery without slowing down workflows.

Wiz Experts Team
Application Security

RCE meaning: Remote code execution attacks explained

Remote code execution refers to a security vulnerability through which malicious actors can remotely run code on your systems or servers.

Wiz Experts Team
Application Security

SAST vs. SCA: What's the Difference?

SAST (Static Application Security Testing) analyzes custom source code to identify potential security vulnerabilities, while SCA (Software Composition Analysis) focuses on assessing third-party and open source components for known vulnerabilities and license compliance.

Wiz Experts Team
Application Security

Microservices Security Best Practices

Microservices security is the practice of protecting individual microservices and their communication channels from unauthorized access, data breaches, and other threats, ensuring a secure overall architecture despite its distributed nature.

Wiz Experts Team
Application Security

What is Open Policy Agent (OPA)? Best Practices + Applications

Open Policy Agent (OPA) is an open-source, versatile policy engine that facilitates unified and context-aware policy enforcement across various cloud environments.

Wiz Experts Team
Application Security

What is SSPM? (SaaS Security Posture Management)

SaaS security posture management (SSPM) is a toolset designed to secure SaaS apps by identifying misconfigurations, managing permissions, and ensuring regulatory compliance across your organization's digital estate.

Wiz Experts Team
Application Security

AI Code Security Explained

AI Code Security Explained

Wiz Experts Team
AI SecurityApplication Security

What Is DevOps Security? Implementation, Challenges and Best Practices

20 essential security best practices every DevOps team should start with

Wiz Experts Team
Application Security

Open-source security: Best practices and tools

Open-source security is the collection of tools and processes used to secure and manage the lifecycle of open-source software (OSS) and dependencies from development to production.

Wiz Experts Team
Application Security

What Is SAST? How Static Application Security Testing Works

Learn how SAST improves your environment, how it differs from DAST, and how you can integrate it into your entire DevSecOps approach to cloud security.

Wiz Experts Team
Application Security

14 OSS Application Security Tools by Use Case

The top 14 open-source application security tools—including SCA, secrets scanning, and application security testing tools—to help you streamline the critical process of securing your apps from threats and vulnerabilities.

Wiz Experts Team
Application Security

What Is Secure Coding? Overview and Best Practices

Secure coding is the practice of developing software that is resistant to security vulnerabilities by applying security best practices, techniques, and tools early in development.

Wiz Experts Team
Application Security

Static Code Analysis

Static code analysis identifies security vulnerabilities and coding issues without executing the code, improving software quality and security.

Wiz Experts Team
Application Security

What is automated code review? Tools and best practices

What is automated code review? Tools and best practices

Wiz Experts Team
Application Security

AppSec Engineers: Responsibilities, Salary, Career Progression

AppSec Engineers: Responsibilities, Salary, Career Progression

Wiz Experts Team
Application Security

IaC Security: How to Ensure Infrastructure as Code Is Secure

Explore how IaC security protects cloud environments by embedding protection into code templates to catch vulnerabilities early.

Wiz Experts Team
Application Security

What is shift-left testing? A complete guide for cloud security teams

Shift-left security testing moves security testing earlier in the software development lifecycle, significantly reducing remediation costs and time compared to traditional approaches.

Wiz Experts Team
Application Security

5 Essential Application Security Controls

Application security controls are technology-independent collections of policies, procedures, and standards to secure software, devices, users, network, and data.

Wiz Experts Team
Application Security

The Impact of AI in Software Development

AI-assisted software development integrates machine learning and AI-powered tools into your coding workflow to help you build, test, and deploy software without wasting resources.

Wiz Experts Team
AI SecurityApplication Security

Exploring Snyk alternatives for cloud-native security teams

Snyk is a development security platform that supports risk identification and remediation across the application lifecycle. While it's a capable tool for developer-centric use cases, there are crucial limitations when it comes to broader cloud security.

Wiz Experts Team
Application Security

What is DevSecOps Automation? Benefits and Best Practices

DevSecOps Automation is the practice of embedding automated security controls into every phase of software development and deployment.

Wiz Experts Team
Application Security

Wiz vs. Snyk: Why It's Not Always Either/Or

Wiz vs. Snyk: Why It's Not Always Either/Or

Wiz Experts Team
Application Security

6 All-Too-Common Code Vulnerabilities

Code vulnerabilities are weaknesses in software that attackers can exploit, potentially compromising security.

Wiz Experts Team
Application Security

What is application vulnerability management?

Application vulnerability management is a continuous process of discovering, assessing, prioritizing, and remediating security weaknesses in your software code, APIs, and dependencies across the entire development lifecycle.

Wiz Experts Team
Application Security

Secure Code Scanning: Basics & Best Practices

In this article, we'll explore the step-by-step process of code scanning, its benefits, approaches, and best practices.

Wiz Experts Team
Application Security

Top 9 Open-Source SAST Tools

In this article, we'll take a closer look at how you can leverage SAST for code security. We'll also explore key features of open-source SAST tools, such as language support, integration capabilities, and reporting functionalities.

Wiz Experts Team
Application Security

Application Risk Management: Embedding AppSec in Every Phase of the SDLC

Application risk management (ARM) is a framework for strategically identifying, measuring, prioritizing, and mitigating risks in cloud-native applications.

Wiz Experts Team
Application Security

How Organizations Can Benchmark, Measure, and Improve Their DevSecOps Capabilities

The OWASP DevSecOps Maturity Model (DSOMM) is a framework for assessing and improving DevSecOps practices.

GoSentrix Security Team
Application SecuritySecurity Best Practices

Secret scanning: How it works and best practices

Secret scanning is the practice of running automated scans on code repositories, execution pipelines, configuration files, commits, and other data sources to prevent potential security threats posed by exposed secrets.

Wiz Experts Team
Application Security

What is code auditing? A complete security guide

Code auditing is the systematic examination of source code to identify security vulnerabilities, bugs, performance issues, and compliance violations.

Wiz Experts Team
Application Security

What is Application Security (AppSec)?

Application security refers to the practice of identifying, mitigating, and protecting applications from vulnerabilities and threats throughout their lifecycle, including design, development, deployment, and maintenance.

Wiz Experts Team
Application Security

What is Application Security Posture Management (ASPM)?

Learn the foundation of application security posture management (ASPM) and how you can apply it to improve cloud security posture. Plus, tools you can use.

Wiz Experts Team
Application Security

DevSecOps in Practice: Top Challenges and Techniques

DevSecOps, which stands for Development, Security, and Operations, is a software development practice that emphasizes integrating security considerations throughout the entire development lifecycle, from initial design to deployment and ongoing maintenance.

Wiz Experts Team
Application Security

AWS DevSecOps explained: Security integration for cloud teams

In this article, we'll demystify AWS DevSecOps so that you can make the most of it. Read on to learn why it's important to adopt; how AWS native services help DevSecOps thrive; and, most importantly, how to combine AWS with DevSecOps best practices for resilient, secure, and reliable infrastructure.

Wiz Experts Team
Application Security

Server-side request forgery: What it is & how to fix it

Server-side request forgery (SSRF) is a high-impact vulnerability where an attacker tricks a server into making requests to internal or restricted resources, potentially exposing APIs, cloud metadata services, and sensitive systems.

Wiz Experts Team
Application Security

What is a DevSecOps Pipeline?

In this article, we'll take a closer look at why DevSecOps is a necessity. Then we'll cover each step of implementation, giving you a comprehensive list of DevSecOps pipeline best practices in 2025.

Wiz Experts Team
Application Security

What are Application Vulnerabilities? Types & Prevention Strategies

Application vulnerabilities are security weaknesses in software code, design, or configuration that attackers can exploit to compromise systems or data.

Wiz Experts Team
Application Security

What is SecDevOps? + How It Differs From DevSecOps

SecDevOps is essentially DevOps with an emphasis on moving security further left. DevOps involves both the development team and the operations team in one process to improve deployment performance and service customers faster.

Wiz Experts Team
Application Security

Top IaC Tools and Practices to Strengthen Code and Cloud Security

The best Infrastructure as Code (IaC) tools, curated by use case and categorized into CSP-specific and CSP-neutral providers.

Wiz Experts Team
Application Security

What is arbitrary code execution? ACE attacks explained

Arbitrary code execution is when an attacker tricks your system into running their malicious code without permission. Think of it like someone breaking into your house and using your computer to do whatever they want.

Wiz Experts Team
Application SecurityThreat Intel

AI SAST: Smarter Static Application Security Testing

AI SAST: Smarter Static Application Security Testing

Wiz Experts Team
AI SecurityApplication Security

IaC Scanning: Concepts, Process, and Tools

Infrastructure as code (IaC) scanning is the process of analyzing the scripts that automatically provision and configure infrastructure.

Wiz Experts Team
Application Security

Shift Left vs Shift Right: Key Differences and Benefits

Shift left vs shift right compares two testing approaches: early code prevention and post deployment monitoring to reduce risk and catch bugs.

Wiz Experts Team
Application Security

What is interactive application security testing (IAST)?

IAST (Interactive Application Security Testing) is a security testing method that monitors applications in real-time during runtime to detect vulnerabilities by analyzing code behavior and data flow in live environments.

Wiz Experts Team
Application Security

Supply Chain Attacks: Examples & Strategies

Supply chain attacks are cyberattacks where threat actors compromise trusted third-party vendors or software components, using that trust to infiltrate the target organization's systems and sensitive data.

Wiz Experts Team
Application Security

Cross-site scripting

Cross-site scripting (XSS) is a vulnerability where hackers insert malicious scripts inside web applications with the aim of executing them in a user's browser.

Wiz Experts Team
Application Security

How to Secure Modern Applications in Cloud-Native Environments with Runtime-Aware Scanning

Dynamic code scanning is security testing of a running application that detects runtime vulnerabilities, performance issues, and misconfigurations.

GoSentrix Security Team
Application SecurityCloud Security

What is Policy as Code?

Policy as code (PaC) is the use of code to define, automate, enforce, and manage the policies that govern the operation of cloud-native environments and their resources.

Wiz Experts Team
Application Security

What is Dynamic Application Security Testing (DAST)?

DAST, or dynamic application security testing, is a testing approach that involves testing an application for different runtime vulnerabilities that come up only when the application is fully functional.

Wiz Experts Team
Application Security

SBOMs: The Foundation of Software Supply Chain Security

Learn how a Software Bill of Materials (SBOM) strengthens security by tracking components, identifying vulnerabilities, and ensuring compliance.

Wiz Experts Team
Application Security

What is reachability analysis in cloud security?

Reachability analysis determines which vulnerabilities in your cloud environment attackers can actually exploit by mapping attack paths from entry points to critical assets

Wiz Experts Team
Application Security

Securing Cloud IDEs

Cloud IDEs allow developers to work within a web browser, giving them access to real-time collaboration, seamless version control, and tight integration with other cloud-based apps such as code security or AI code generation assistants.

Wiz Experts Team
Application Security

What is Malicious Code? Types, Risks, and Prevention Strategies

Malicious code is any software or programming script that exploits software or network vulnerabilities and compromises data integrity.

Wiz Experts Team
Application Security

Terraform Security Best Practices

Common security risks associated with Terraform and the 6 essential best practices for terraform security.

Wiz Experts Team
Application Security

What is Software Composition Analysis? SCA Tools and Implementation

Software composition analysis (SCA) tools index your software dependencies to give you visibility into the packages you're using and any vulnerabilities they contain.

Wiz Experts Team
Application Security

The Top 11 Open-Source SBOM tools

This article will start with a quick refresher on SBOMs and then list the top SBOM-generation tools available.

Wiz Experts Team
Application Security

The Secure Software Development Framework (SSDF)

NIST's Secure Software Development Framework (SSDF) is a structured approach that provides guidelines and best practices for integrating security throughout the software development life cycle (SDLC).

Wiz Experts Team
Application Security

SAST vs DAST: How to Use Both Testing Tools for App Security

In this Academy article, we'll dig into SAST and DAST security testing methods, exploring how they work and their core aspects

Wiz Experts Team
Application Security

CI/CD Pipeline Security Best Practices 2025

Learn about CI/CD pipeline security best practices to protect your software lifecycle from vulnerabilities and attacks while maintaining development velocity.

Wiz Experts Team
Application Security

What is the SLSA Framework?

In this article, we'll discuss how DevOps teams can take advantage of this framework to create reliable build pipelines and, more generally, secure the entire software development lifecycle.

Wiz Experts Team
Application Security

Essential Application Security Best Practices

This article outlines guidelines and best practices for weaving security into every part of your development and DevOps workflows, focusing on practical techniques that are easy to adopt.

Wiz Experts Team
Application Security

tfsec: Open-Source IaC Security Scanner

tfsec: Open-Source IaC Security Scanner

Wiz Experts Team
Application Security

Shift Left Explained: What It Means to Shift Security Left

Improve development workflows with shift left security by embedding testing early to catch vulnerabilities and speed delivery.

Wiz Experts Team
Application Security

CI/CD security tools

CI/CD security tools automate security checks in development pipelines to identify vulnerabilities and misconfigurations during code changes, ensuring continuous security.

Wiz Experts Team
Application Security

Software Supply Chain Best Practices [Step by Step Guide]

In this blog post, we'll take a deep dive into software supply chains and discuss effective strategies for reducing security risks.

Wiz Experts Team
Application Security

What is Application Security testing?

Application security testing (AST) is a set of processes designed to detect and address security gaps during the early phases of the software development lifecycle (SDLC). In other words, teams take steps in pre-production to identify and mitigate risks before applications are released into operational environments.

Wiz Experts Team
Application Security

Top OSS SCA Tools

Open-source software (OSS) software composition analysis (SCA) tools are specialized solutions designed to analyze an application's open-source components and dependencies.

Wiz Experts Team
Application Security

What is Security as Code (SaC)?

Security as Code (SaC) is a methodology that integrates security measures directly into the software development process. It involves codifying security policies and decisions, and automating security checks, tests, and gates within the DevOps pipeline.

Wiz Experts Team
Application Security