Headed to RSA? Schedule time to discuss how Qwiet AI agents can help secure your software
RSA 2025 is almost here, and if you plan just to wing it, good luck. With a packed schedule and an overwhelming amount of vendor noise, this year’s conference will be full of AI hype, a key theme shaping the discussions and presentations. You’ll need a solid plan to cut through the clutter and get […]
READ MOREArtificial intelligence (AI) is a rapidly evolving technology that has the potential to transform various sectors of our society. However, with the great power of AI comes the great responsibility to ensure that it is used ethically, responsibly, and safely. Recently, the Biden Administration announced new actions to promote responsible AI innovation that protects Americans’ […]
These days, when we talk about attacks, we are talking about endpoints—those pinpoint openings that allow adverse entities to hack into our computer systems. The endpoints vary in attack surface: some are accessed through phishing, while others are achieved through bounties. But however they are reached, they loom large among cybersecurity professionals, with a tangibility […]
The Food and Drug Administration (FDA) recently issued new requirements mandating that medical devices be secured against cyberattacks. This move comes after a long-standing concern about the potential for these devices to be hacked and used to harm patients. This new requirement is a significant step towards securing medical devices, which have been increasingly […]
The source code of Twitter was recently (maybe?) leaked on GitHub, a popular code repository platform. The code repository was quickly taken down, but not before it had been downloaded by hundreds of users. The leak has drawn attention from security experts regarding the implications for the social media platform and raised concerns over the […]
In a recent thread on a discussion forum, a group of developers discussed time lost on bug chasing. One developer lamented that he lost 5 days; another 5 years between the time it was discovered and the time it was finally resolved. Still another developer estimated that in an organization of 400 engineers, […]
A New Approach To Prioritization In the race to produce code, security can sometimes seem like a bit of a speedbump. Engineering teams face tight deadlines and security teams want to ensure the code doesn’t ship with vulnerabilities that could lead to the next big breach. At Qwiet AI, we’ve found that even highly accurate […]
In a recent thread on a discussion forum, a group of developers discussed time lost on bug chasing. One developer lamented that he lost 5 days; another 5 years between the time it was discovered and the time it was finally resolved. Still another developer estimated that in an organization of 400 engineers, he and […]
The Biden Administration released its National Cybersecurity Strategy last week. It aims to address the increasing threat of cyberattacks and protect America’s critical infrastructure, data, and networks. With cybersecurity becoming an ever more pressing issue, the strategy sets out a comprehensive approach that focuses on safeguarding government and private sector networks, reducing risk, and enhancing […]
As we embark on this new chapter in application security, it’s important to understand how AI and machine learning can provide greater understanding and insight into vulnerabilities than older methods of detection. In this article we will cover the following: The risk of using vulnerable dependencies (directly or transitively) Not all vulnerabilities pose risk. Why not? […]