Second wave of Shai-Hulud npm worm compromises the global software supply chain
DAST for GraphQL APIs: Securing the next generation of data access
How to choose an SCA tool that cuts through the noise and secures what matters
DAST automation in CI/CD: 5 steps to build a secure pipeline without slowing down
What we learned about API discovery from comparing runtime and edge views
Protecting financial web applications: Why centralized vulnerability management is critical
DAST and SCA: The AppSec power duo you might be underestimating
Strengthening enterprise application security: Invicti acquires Kondukto
Top 10 container scanning tools for 2025: Secure your containers and the apps they power