AppSec Blog
Keep up with the latest news on cybersecurity, technical trends, and programming best practices.
Create a Web Application Security Blueprint
The best way to make web applications secure is to include security at every step along the development process, from requirements analysis, to design, to implementation and testing, and into...
Managing Open-Source Vulnerabilities in DevOps
If you use open-source code frameworks, libraries, and code components and take advantage of code-scanning technologies, sooner or later you’ll find yourself in an interesting situation: learning...
AppSec or Just Smart Software Development
The source of all human knowledge (Wikipedia) describes application security as “measures taken to improve the security of an application often by finding, fixing and preventing security...
SAST and SCA: Putting the Puzzle Together
Developing correct and secure software isn’t easy. A typical application includes a large amount of original and third-party code, and it all has to work together without opening up security holes....
Why SAST Is Crucial for Security of Web and Mobile Applications
Software applications are used both in homes and workplaces. Web and mobile apps are used for communication. They help businesses and individuals get updates on the latest trends and happenings....
Scanning Code Vulnerabilities
When it comes to analyzing code bases for security purposes, developers and their managers face some interesting choices. Application security testing can occur on demand, with scanning tools that...
Understanding and Managing Open-Source Risks
These days, the tendency is to treat software development as a semi-custom build job. Some parts are prefabricated and come from other sources. The rest is custom-built, in-house or under contract,...
Programming Language Trends in 2020
High-level programming languages have gone a long way since the invention of Short Code in 1949. New languages are being created all the time, sometimes as a joke, but most times to deal...
Application Security Tools Comparison
DAST, SAST, IAST, and SCA: Which Security Technology Is Best? With the variety of application security testing (AST) tools out there, you might be wondering which one should you use to secure your...
Application Inventory Management
How Application Inventory Management Unlocks Your App for Affordable Maintenance and Development As your application grows in complexity, it’s critical to maintain a strong understanding of its...
Security Standards in Software Development
The need for security in all things technology is well-known and paramount. That includes the demand for the highest security standards in software development as well. For companies and developers,...
What Is Continuous Integration and Continuous Delivery (CI/CD)?
Thousands of apps are released every year. A study by Burga in 2021 revealed that developers published over 355,000 apps on Apple’s App Store alone, each day seeing an average of about 1,000 apps....
The Future of IT Security: SOAR
We are in an era of data explosion. At the same time, threats are multiplying. As a result, the day-to-day efforts of securing data could overwhelm your Security Operations Center (SOC) team. A...