AppSec Blog

Keep up with the latest news on cybersecurity, technical trends, and programming best practices.

Create a Web Application Security Blueprint

Create a Web Application Security Blueprint

The best way to make web applications secure is to include security at every step along the development process, from requirements analysis, to design, to implementation and testing, and into...

Managing Open-Source Vulnerabilities in DevOps

Managing Open-Source Vulnerabilities in DevOps

If you use open-source code frameworks, libraries, and code components and take advantage of code-scanning technologies, sooner or later you’ll find yourself in an interesting situation: learning...

AppSec or Just Smart Software Development

AppSec or Just Smart Software Development

The source of all human knowledge (Wikipedia) describes application security as “measures taken to improve the security of an application often by finding, fixing and preventing security...

SAST and SCA: Putting the Puzzle Together

SAST and SCA: Putting the Puzzle Together

Developing correct and secure software isn’t easy. A typical application includes a large amount of original and third-party code, and it all has to work together without opening up security holes....

Scanning Code Vulnerabilities

Scanning Code Vulnerabilities

When it comes to analyzing code bases for security purposes, developers and their managers face some interesting choices. Application security testing can occur on demand, with scanning tools that...

Understanding and Managing Open-Source Risks

Understanding and Managing Open-Source Risks

These days, the tendency is to treat software development as a semi-custom build job. Some parts are prefabricated and come from other sources. The rest is custom-built, in-house or under contract,...

Programming Language Trends in 2020

Programming Language Trends in 2020

High-level programming languages have gone a long way since the invention of Short Code in 1949. New languages are being created all the time, sometimes as a joke, but most times to deal...

Application Security Tools Comparison

Application Security Tools Comparison

DAST, SAST, IAST, and SCA: Which Security Technology Is Best? With the variety of application security testing (AST) tools out there, you might be wondering which one should you use to secure your...

Application Inventory Management

Application Inventory Management

How Application Inventory Management Unlocks Your App for Affordable Maintenance and Development As your application grows in complexity, it’s critical to maintain a strong understanding of its...

Security Standards in Software Development

Security Standards in Software Development

The need for security in all things technology is well-known and paramount. That includes the demand for the highest security standards in software development as well. For companies and developers,...

The Future of IT Security: SOAR

The Future of IT Security: SOAR

We are in an era of data explosion. At the same time, threats are multiplying. As a result, the day-to-day efforts of securing data could overwhelm your Security Operations Center (SOC) team. A...