Keeping Your Organization Secure with Limited SOC Resources
Organizations face a growing threat from cybercriminals while struggling to find qualified security professionals who can protect their ..
A Developer’s View: What Kind of AST Event Correlation Is Needed in MAD?
Having AST capabilities built into the tooling that we use in our day-to-day tasks as developers provides a lot of value when we’re trying ..
A Developer’s View of Modern Application Development and Cloud-Native Approaches
The way that we build software has changed dramatically in recent years. Modern Application Development (MAD) and cloud-native development ..
Understanding Security Automation vs. Orchestration
“Automation” and “orchestration” are terms that frequently appear within the same sentence – which is unsurprising, because they ..
5 Questions to Ask When Developing an Automation Strategy
This post was previously published on The New Stack. Automation is like running a marathon. It sounds like a great and noble pursuit until ..
Automated Threat Intelligence Enrichment: An Overview
This post was previously published on The New Stack. Discovering security threats is good and well. But, in many cases, simply knowing ..
APIs Are Great – But Only If You Manage API Sprawl and Security Risks
If you had to find an analogy for the explosive growth of APIs over the past decade, you might choose to compare them to cell phones. Like ..
Considerations and Steps for Adopting Managed AppSec Security Tests
At least, that’s one question you may be asking yourself if you’re trying to decide how to optimize your business’s approach to application ..
JSON Basics: Building Blocks for Workflow Automation
Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, ..
Key Considerations for Building a Proper AppSec Program for Modern Application Development
Many firms’ security efforts are focused solely on deploying technologies, applying “best practices,” and responding to a never-ending ..
The Case for Outsourcing AppSec Testing to a Managed Service Provider
Businesses commonly turn to managed service providers to help handle IT processes like data backup and recovery, network management, and mobility ..