Code Analysis Methods

Software tools for code analysis let developers create code which has fewer bugs and is more secure.

GDPR – General Data Protection Regulation

The GDPR is Promoting a Culture Change About Data Privacy   The importance and need for security has never been greater, in particular with personal and data security.

Owasp top 10 2017 – A10 Insufficient Logging & Monitoring

Audit Trail Vulnerabilities: Insufficient Logging and Monitoring   Insufficient logging and monitoring of computer systems, applications and networks provide multiple gateways to probes and breaches that can be difficult or impossible to identify and resolve without a viable audit trail.

Owasp Top 10 2017 – A8 Insecure Deserialization

What Insecure Deserialization Is Capable Of The new 2017 OWASP Top 10 shows that insecure deserialization has edged out CSRF (Cross-site Request Forgery) from the NO.

Owasp top 10 2017 – A4 XML External Entities (XXE)

Understanding How External Entities Attack XML Files Extensible Markup Language (XML) files are plain-text files that describe data behavior as that data relates to a connected network or server application.

Continuous analysis with Kiuwan and Visual Studio Team Services (VSTS)

Microsoft is not that company neglecting everything that has anything to do with the Internet anymore.


If you live in the world of Appsec, ever visit the realm of software development or know the landscape of DevOps security for example, then you understand and appreciate the NIST.

What is Application Security?

The conversation surrounding application security could go a thousand different directions, technology is a massive landscape after all.

How Shift Left Is Implemented in DevSecOps

2017 may well be a watershed year for the hacker. It has now been 

DevSecOps: Building a Culture of Responsibility for Network Security

Security vulnerabilities are everywhere. If nothing else, the 

Application Inventory Management

How Application Inventory Management Unlocks Your App for Affordable Maintenance and Development   As your application grows in complexity, it's critical to maintain a strong understanding of its back-end functionality.

Static Analysis in Automated Software Quality Tests

Software quality management solutions function with automated tests that use static analysis processes to generate 

Why Automated Code Reviews Need to Include Security Audits

When you and your team are coding a web app, you do your best to avoid any potential security holes in the code.