Systems | Development | Analytics | API | Testing

Stop Guessing with OAuth: Understanding CI/CD

OAuth 2.0 is the leading open authorization framework that enables secure delegated access to protected resources. From traditional web apps and browser-based apps to native apps and desktop applications, OAuth allows client apps to grant access on a user’s behalf without exposing login credentials, enabling powerful third-party applications, custom data flows, and powerful user experiences. However, while OAuth is secure, it’s not always fast.

What Is CVE? Common Vulnerabilities and Exposures Overview

Common Vulnerability and Exposures (CVE) collects known cybersecurity vulnerabilities and exposures to help you to better safeguard your embedded software. This framework is central to managing security threats effectively. Here, we explain what is CVE, unpack the role of CVE identifiers, examine the differences of CVE vs. CWE, expand on the CVE list, and outline how identifying vulnerabilities early in software development can be achieved with the right static analysis tools.

SOC 2 Checklist for SaaS Teams: What You Need to Know

You just landed your biggest deal ever. An enterprise client is ready to sign a million-dollar deal, but there’s one non-negotiable: they need your SOC 2 report in 90 days. Now you’re in trouble. Internal controls, access policies, logging, vendor due diligence it all hits at once. The team is Googling terms like “SOC 2 Type II” and “audit readiness,” trying to make sense of what feels like a regulatory jungle. This happens every day in fast-growing SaaS companies.

Introducing NCM v3: AI-Enhanced Security & Performance for Node.js

At NodeSource, we live and breathe Node.js and are passionate about performance and security. We understand that for developers and platform teams, managing the security and compliance of dependencies is a mission-critical task. However, the tools designed to help can sometimes become part of the problem. Today, we’re proud to introduce NodeSource Certified Modules v3 (NCM v3): a complete rearchitecture of our module scanning and observability engine.

RBAC vs ABAC: API Security Implications

Securing APIs requires managing who can access resources and under what conditions. Two primary models stand out: Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC). Here's the key takeaway: RBAC assigns permissions based on predefined roles, making it simple to manage in structured environments. ABAC evaluates multiple real-time attributes for dynamic, granular control, ideal for complex or evolving scenarios.

Bitrise maintains SOC 2 Type II compliance with latest successful assessment

At Bitrise, we continually invest in security best practices to ensure that our customer’s data stays safe and secure. As a part of an on-going effort, we are excited to announce that we’ve successfully completed our SOC 2 report. The examination was conducted by A-LIGN, a technology-enabled security and compliance firm trusted by more than 4,000 global organizations to help mitigate cybersecurity risks.

CVE Funding Disruption: How Security Teams Can Prepare

The longstanding Common Vulnerability and Exposure (CVE) database has vitally guided security teams for over 20 years, connecting cybersecurity experts, developers, vendors, and researchers in their shared ability to track unknown vulnerabilities in software. But in April of 2025, the MITRE CVE database program was in jeopardy. U.S. government funding for CVE, managed by MITRE and sponsored by CISA, was set to expire. Only in the 11th hour was funding secured, and the contract extended — for now.

API Security: Validating Auth and Access with Traffic Simulation Starts with Behavior

Security breaches rarely begin with a hidden zero-day exploit or a complex web of escalated hacks. They often start in very simple ways – an internal team member is breached, a permission is misconfigured, an overly permissive API endpoint is overlooked, or a JWT simply doesn’t expire. An API, or application programming interface, is a set of protocols and tools that enable different software systems to communicate and exchange data, making them essential in modern software development.