Blog

AppSec Blog

Web Security

Invicti DAST-to-SAST correlation: Fix verified runtime risks at pipeline speed

Web Security

Container Security: A Quick Overview

Web Security

Looking for the best in DAST: How to select DAST tools for DevSecOps

Web Security

SolarWinds, the SEC, and the CISO: Who is legally responsible for security?

Web Security

Demystifying XXE Vulnerabilities in Java Libraries

Web Security

An abundance of caution: Why the curl buffer overflow is not the next Log4Shell

Web Security

Get Management Buy-in with AppSec Metrics

Web Security

Rapid Reset HTTP/2 vulnerability: When streaming leads to flooding

Web Security

Top 5 application security misconfigurations