Your application security testing tool just got acquired. Now what?

Your application security testing tool just got acquired. Now what?

A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired. The post Your application security testing tool just got acquired. Now what? appeared first on Software Integrity Blog ... Read More
Q&A: Interactive application security testing (IAST) and Seeker

Q&A: Interactive application security testing (IAST) and Seeker

Do you have questions about IAST? We’ve got answers, explanations, and recommendations. Read our responses to audience questions from our last IAST webinar. The post Q&A: Interactive application security testing (IAST) and Seeker appeared first on Software Integrity Blog ... Read More
The Verizon DBIR and the art of the breach

The Verizon DBIR and the art of the breach

An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights. The post The Verizon DBIR and the art of the breach appeared first on Software Integrity Blog ... Read More