Blog

AppSec Blog

Web Security

Invicti DAST-to-SAST correlation: Fix verified runtime risks at pipeline speed

Web Security

The Helix Files: Choose Your Own Adventure

Web Security

Protecting the APIs of Modern Applications

Web Security

Empowering Developers in AppSec: Triage and Collaboration

Web Security

HTTP security headers: An easy way to harden your web applications

Web Security

The OWASP API Security Top 10 demystified

Web Security

Enhancing Vulnerability Management with Threat Intelligence

Web Security

What’s the big deal with post-quantum cryptography?

Web Security

How the DORA framework mandates application security testing (and many other things)