How Neural Networks Work
One of the problems with Machine Learning (ML) and Deep Learning (DL) is the so-called black box aspect, which is the fact that it’s often ..
Top 10 Malicious Package Scanners
Open source public repositories can pose a number of threats to organizations due to malicious practices such as typosquatting, dependency ..
5 Questions to Ask When Developing an Automation Strategy
This post was previously published on The New Stack. Automation is like running a marathon. It sounds like a great and noble pursuit until ..
How To Detect Typosquatting With Python
Typosquatting occurs when a bad actor: Creates a malware-infected open source package. Names the package similar to that of an existing ..
How Chatbot Automation Benefits Security Teams
This post was previously published on The New Stack. When you hear the term “chatbot,” your mind may at first turn to things like robotic ..
What Are the Challenges With Securing APIS?
When you expose API services to the public internet, you are responsible not only for their reliable operation, but also for their security. ..
Automated Threat Intelligence Enrichment: An Overview
This post was previously published on The New Stack. Discovering security threats is good and well. But, in many cases, simply knowing ..
What Is Your API Attack Surface
The proliferation of APIs today is astonishing. According to a recent report, the number of active APIs will approach 1.7 billion by 2030. ..
What Are Control Flow Statements?
Control flows are the backbone of automation. Identifying what to do with a set of data – and how – is a key component of high-value ..
APIs Are Great – But Only If You Manage API Sprawl and Security Risks
If you had to find an analogy for the explosive growth of APIs over the past decade, you might choose to compare them to cell phones. Like ..
An Introduction to Automation Basics
Automation is a powerful tool. With some foresight and a little elbow grease, you can save hours, days, or even months of work by strategically ..
Considerations and Steps for Adopting Managed AppSec Security Tests
At least, that’s one question you may be asking yourself if you’re trying to decide how to optimize your business’s approach to application ..
JSON Basics: Building Blocks for Workflow Automation
Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, ..
A Beginner’s Guide to Android App Testing
Android is, by far and away, the world’s most popular mobile operating system. Its global market share across mobile devices of all types ..
A Beginner’s Guide to iOS App Testing
What Is iOS App Testing? iOS app testing is the process by which an iOS application is tested on Apple devices like iPhone and iPad. The goal ..
Key Considerations for Building a Proper AppSec Program for Modern Application Development
Many firms’ security efforts are focused solely on deploying technologies, applying “best practices,” and responding to a never-ending ..
Best Practices to Collect, Customize and Centralize Node.js Logs
Node.js is an established platform for developing server-side applications in JavaScript. One of the most fundamental concerns that arise ..