LinuxFest Northwest: Lightning Talks – Security Boulevard

DEF CON 32 – AppSec Village – Web2 Meets Web3 Hacking Decentralized Applications

Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s events located at the Bellingham Technical College in Bellingham, Washington; and via the organizations YouTube channel. Thanks and a Tip O’ The Hat to […]

Writing Secure Code with Windsurf

Writing Secure Code with Windsurf

The rise of AI-powered development tools has changed how we write code, but it’s also introduced new security challenges. While tools like Windsurf can speed up development, using them can also introduce vulnerabilities that can be easily missed. In this guide, we’ll show you how to combine the power of Windsurf’s AI-powered IDE with StackHawk’s […]

Secret Scanning to Protect Sensitive Data in Code

AppTrana WAAP

With the rise of CI/CD pipelines, cloud-native development, and globally distributed teams, sensitive credentials like API keys, tokens, and database passwords often slip into source code. Sometimes accidentally, sometimes under pressure to deploy fast. This is not a rare mishap. A recent study found that 34% of API security incidents involve sensitive data exposure. And […]

Scan AI-Generated Code in Cursor with Snyk MCP | Real-time Security

We’re happy to announce that Cursor has validated Snyk’s CLI MCP server and added Snyk to their curated set of MCP tools from official providers.  At Snyk, we recognized early on that although AI assistants accelerate development, they can inadvertently introduce vulnerable patterns, leverage outdated libraries, or even code with known security flaws. In order […]

2025 CISO Guide to Securing AI-Generated Code

2025 CISO Guide to Securing AI-Generated Code

Mark Twain famously said, “History doesn’t repeat itself, but it often rhymes.” In tech security, AI is creating a new verse that rhymes with Cloud.  Just over a decade ago, CISOs tried to ban Dropbox and Google Drive to stop unsanctioned file sharing. That didn’t work. Cloud apps simply went underground—until security leaders realized that […]

Choice Screening Services: Adverse Action Letters

Choice Screening Services: Adverse Action Letters

Whenever an employer uses a background check to make a decision that is not in favor of the applicant, the employer is taking Adverse Action and must follow certain rules to maintain compliance. 

A County Background Check Introduction

A County Background Check Introduction

Why It Matters Since many criminal cases are handled at the county level, county criminal background checks often provide highly detailed and up-to-date records by pulling information directly from local court systems. However, depending on the state, some statewide searches can offer similar accuracy, especially when they pull real-time data directly from county courts. Many […]

LinuxFest Northwest: Chaos Testing Of A Postgres Cluster On Kubernetes

DEF CON 32 – AppSec Village – Web2 Meets Web3 Hacking Decentralized Applications

Author/Presenter: Nikolay Sivko (Co-Founder And CEO At Coroot) Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s events located at the Bellingham Technical College in Bellingham, Washington; and via the organizations YouTube channel. […]

Now in GA – Sensitive Data Types for API Discovery

Now in GA - Sensitive Data Types for API Discovery

Here’s what we’re seeing: In late 2024, development teams were shipping 5-8 new applications weekly. This year, that pace has accelerated to 8-12 applications per week. With each application powered by 26-50 APIs on average, enterprises now find themselves managing hundreds to thousands of APIs—an explosion fueled by AI coding assistants like GitHub Copilot, Cursor, […]