Image Application Security Vulnerability Management Outsmart Cybercriminals with Proactive Attack Surface Management (ASM) February 7th, 2023 Why is ASM Important? Your attack surface is the sum of all entry points an... Read Now
Image Application Security How Human Testers Improve Application Security December 9th, 2022 A suite of DevSecOps tools is available to automate reviews, audits, tests, and scans throughout... Read Now
Application Security Vulnerability Management Penetration Testing Introducing Unified HackerOne Scope Management with Burp Suite Support September 15th, 2022 This post will start with the basics of defining scope and how ethical hackers and... Read Now
Image Application Security Vulnerability Management Security Highlights: New CWE Rankings, Software Supply Chains, and Side-Channel Attacks July 5th, 2022 MITRE Releases 2022 CWE Top 25 The popular CWE Top 25 list, which ranks the... Read Now
Image Application Security 5 Security Stages of the DevSecOps Pipeline June 28th, 2022 5 Security Stages In-Depth A typical DevOps pipeline contains eight stages. The DevSecOps pipeline retains... Read Now
Image Application Security DevSecOps vs DevOps: What is the Difference? June 23rd, 2022 In this article, we’ll explain what DevSecOps is, how it differs from DevOps, and what... Read Now
Image Application Security The Most Overlooked Server Permission Checks June 23rd, 2022 We previously looked at common server authentication issues we see in code review and offered... Read Now
Image Application Security Severe Confluence Vulnerability is an Active Threat (CVE-2022-26134) June 6th, 2022 Background The vulnerability allows unauthenticated remote code execution (RCE). Exploitation occurs by sending an HTTP... Read Now
Image Application Security 5 Ways I Provide Value as a PullRequest Reviewer When I Start Reviewing a New Project May 24th, 2022 As shown in Figure 1 below, even early reviews can provide value. Catching Security Vulnerabilities... Read Now