AI Crawler WAF Policies: Go Beyond Just Blocking

AppTrana WAAP

Why blocking should always be the final step, not the first instinct Artificial intelligence has changed the way people discover information online. Instead of scrolling through ten blue links, millions now ask chat assistants for instant answers. Those assistants rely on automated software known as AI crawlers. These crawlers visit public websites, collect text, code, […]

Minimizing False Positives: Enhancing Security Efficiency

Minimizing False Positives: Enhancing Security Efficiency

Organizations waste enormous amounts of time chasing down security alerts that turn out to be nothing. Recent research from May 2025 shows that 70% of a security team’s time is spent investigating alerts that are false positives, wasting massive amounts of time in the investigation rather than working on proactive security measures to improve organizational […]

Bridging the Gap with Agentic AI

Bridging the Gap with Agentic AI

If you asked a room full of CISOs how AI has changed their work, the answers would mix optimism with anxiety. This tension between acceleration and risk is where modern application security teams now live.   As Sandeep Johri, CEO of Checkmarx, shared during our recent Agentic AI Summit, AI coding assistants bring meaningful productivity gains, […]

Are Background Checks Customizable?

Are Background Checks Customizable?

Choice Screening’s background check packages are fully customizable. Our dedicated account advisors will work with you to create background check packages to help meet your needs. Choice Screening has over 30 products and services for you to choose from!

Employers Guide to Statewide Criminal Background Checks

Employers Guide to Statewide Criminal Background Checks

How Does a Statewide Criminal Background Check Work? A statewide criminal background check pulls criminal history records from multiple counties within a single state. Depending on the state law, it may include felony convictions, misdemeanor convictions, and arrest records (where legally permissible). Not all states maintain complete state background checks. Some states update their databases […]

LinuxFest Northwest: Lightning Talks – Security Boulevard

DEF CON 32 – AppSec Village – Web2 Meets Web3 Hacking Decentralized Applications

Our sincere appreciation to LinuxFest Northwest (Now Celebrating Their Organizational 25th Anniversary Of Community Excellence), and the Presenters/Authors for publishing their superb LinuxFest Northwest 2025 video content. Originating from the conference’s events located at the Bellingham Technical College in Bellingham, Washington; and via the organizations YouTube channel. Thanks and a Tip O’ The Hat to […]

Writing Secure Code with Windsurf

Writing Secure Code with Windsurf

The rise of AI-powered development tools has changed how we write code, but it’s also introduced new security challenges. While tools like Windsurf can speed up development, using them can also introduce vulnerabilities that can be easily missed. In this guide, we’ll show you how to combine the power of Windsurf’s AI-powered IDE with StackHawk’s […]

Secret Scanning to Protect Sensitive Data in Code

AppTrana WAAP

With the rise of CI/CD pipelines, cloud-native development, and globally distributed teams, sensitive credentials like API keys, tokens, and database passwords often slip into source code. Sometimes accidentally, sometimes under pressure to deploy fast. This is not a rare mishap. A recent study found that 34% of API security incidents involve sensitive data exposure. And […]

Scan AI-Generated Code in Cursor with Snyk MCP | Real-time Security

We’re happy to announce that Cursor has validated Snyk’s CLI MCP server and added Snyk to their curated set of MCP tools from official providers.  At Snyk, we recognized early on that although AI assistants accelerate development, they can inadvertently introduce vulnerable patterns, leverage outdated libraries, or even code with known security flaws. In order […]

2025 CISO Guide to Securing AI-Generated Code

2025 CISO Guide to Securing AI-Generated Code

Mark Twain famously said, “History doesn’t repeat itself, but it often rhymes.” In tech security, AI is creating a new verse that rhymes with Cloud.  Just over a decade ago, CISOs tried to ban Dropbox and Google Drive to stop unsanctioned file sharing. That didn’t work. Cloud apps simply went underground—until security leaders realized that […]