I’m ASPM, You’re ASPM… We’re All ASPM!
by Eric Sheridan on
The past two weeks have been amazing for Tromzo. First we were named as an Application Security Posture Management (ASPM) Sample Vendor in Gartner's Hype Cycle for Application Security, 2023. And just recently, we announced an additional $8 million in an oversubscribed seed round!
Read more
“Shocking” Discovery in Verizon Data Breach Report: Hackers Gonna Hack!
by Eric Sheridan on
Verizon recently released their 2023 Data Breach Investigations Report reflecting on the past year’s breaches. I love these sorts of reports because they offer a ton of observations and talking points that I can carry with me throughout the year, all backed by real-world data. In a time where my LinkedIn feed is overflowing with #opentowork posts due to the many massive layoffs in the tech industry (sidebar: something that I think reflects a leadership problem), there is one underlying theme in the Verizon report that sticks out like a sore thumb. The following quotes will kick this discussion off nicely…
Read more
Context a Cornerstone in Gartner’s Innovation Insight for ASPM
by Eric Sheridan on
In case you missed it, in May Gartner released its Innovation Insight for Application Security Posture Management (ASPM). What is an ASPM you ask?
Read more
Introducing Intelligence Graph!

A Prioritized Risk View of the Entire Software Supply Chain, from Code to Cloud

tl;dr 

Tromzo launches new capabilities to accelerate remediation of risks that truly matter, by bringing deep environmental and organizational context from code to cloud. Tromzo’s Intelligence Graph correlates data from development tools like Code Repositories, CI/CD Platforms, Artifact Registries and Cloud Platforms to accurately identify software asset ownership, business criticality of those artifacts and ties all that context back to the security issues reported by various security scanners.
Read more
Product Security Has a Massive Data Problem
by Eric Sheridan on
Tromzo's Chief Innovation Officer Eric Sheridan dives deep into why product security has a massive data problem.
Read more

Ready to Scale Your Application Security Program?

Sign up for a personalized one-on-one walkthrough.

Request a demo

[email protected]

Request a demo