An Exclusive Interview with Dragan Pleskonjić
Cyber Security Summit website published an exclusive interview with Glog.AI initiator and founder Dragan Pleskonjić. You can read the interview here.
Cyber Security Summit website published an exclusive interview with Glog.AI initiator and founder Dragan Pleskonjić. You can read the interview here.
Glog.AI is the name of the project in which we set the goal of making the software as secure as possible. Glog is Serbian language name for hawthorn. It is a plant whose flowers and fruits (Serbian: gloginje) help with … Continued
Glog.AI is now open to investors and partners until May 15, 2024. Started as a privately owned research and development project, Glog.AI is evolving into a startup company with promising results and products. Join the Glogosphere Ecosystem and submit your … Continued
The Glog.AI Glogosphere Ecosystem is a comprehensive framework designed to enhance software security within the Software Development Lifecycle (SDLC). Let’s explore its components and how it contributes to making software more secure: Components of Glog.AI Glogosphere Ecosystem: Glog.AI Resolver: Part of the … Continued
Glog.AI Ecosystem i.e. Glogosphere Ecosystem consists of: Glog.AI Resolver Glog.AI Server Onboarding Threat Modeling Predictions Triage Remediation REST API IDE plugins Source Control Systems (e.g. GitHub) integrations Glog Server Microservices GASM – Glog Application Security Management Glog Monitor Glog Services … Continued
Glog.AI can assist in implementing the Agile process in software development by offering solutions that integrate security within the Software Development Lifecycle (SDLC). Here’s how it can help: Automated Security Remediation: Glog.AI’s platform can automatically fix security vulnerabilities in code, … Continued
Why do you need the strongest software security? Why do you need Glog.AI? Important drivers which you should consider for adoption are – you want/need to: Implement software security in software development lifecycle (SDLC). Prepare for audits for various security … Continued
Application Security Posture Management (ASPM) is a comprehensive approach to managing and improving the security of an organization’s applications. It involves: Evaluating the security stance of custom applications. Managing adherence to security standards. Enhancing resistance to cyber threats and ensuring … Continued
We offer training on Artificial Intelligence for Cybersecurity and Software Security to our clients. Here is training preliminary content. First part: Introduction Demystifying artificial intelligence for cybersecurity Cybersecurity and software security goals, frameworks and gaps An approach to solving cybersecurity … Continued
We offer training on Software & Application Security Training to our clients. Here is training preliminary content. Application Security SSA: Define and implement Software Security Assurance (SSA) program in your company Define Application and Software Security practice and ISMS (policies, … Continued