SAST vs DAST vs IAST

I would think most would agree that it wouldn’t be too much of a stretch to draw the parallel between security tools and medicines and threats as diseases which brings us to the tried but true analogy of “the medicine is worth the cure”. The post SAST vs DAST vs ... Read More
K2 can protect against Log4J without patching

K2 can protect against Log4J without patching

The Log4J vulnerability has been given a CVSS Score of 10, making it the most serious of discovered flaws. VentureBeat is reporting that Log4J attacks have been attempted on 44% of corporate networks. Find out how to protect against Log4J attacks. The post K2 can protect against Log4J without patching appeared first on K2io ... Read More
Can Your IAST Do This?

Can Your IAST Do This?

While Interactive Application Security Testing (IAST) is still a relatively new technology from the perspective of adoption, it has been around for over 10 years and some of the aspects and capabilities around IAST are well understood, such as improved vulnerability detection, achieved by “looking” inside the application at runtime.   But there are features your IAST should be able to give you ... Read More