Blog

AppSec Blog

Web Security

Invicti DAST-to-SAST correlation: Fix verified runtime risks at pipeline speed

Web Security

What is vulnerability scanning and how do web vulnerability scanners work?

Web Security

The three pillars of application security: A cybersecurity expert’s perspective

Web Security

Generating build-time SBOMs with CycloneDX and Invicti ASPM

Web Security

The role of an API scanner in API security

Web Security

Secure software development: Building better software with secure practices

Web Security

3 types of vulnerability scanners that matter for application security

Web Security

API security scanning with DAST: Proof-Based AppSec

Web Security

What is API Security? A comprehensive guide to API security