Kimm Yeo, Author at Security Boulevard
Synopsys’ Seeker IAST wins Best Cloud and Web Application Security category at CybersecAsia Awards

Synopsys’ Seeker IAST wins Best Cloud and Web Application Security category at CybersecAsia Awards

Seeker was recognized for its leadership and innovation in cloud and web-based application security. Learn how to improve your security posture with IAST. The post Synopsys’ Seeker IAST wins Best Cloud and Web Application Security category at CybersecAsia Awards appeared first on Software Integrity Blog ... Read More
The ins and outs of fuzz testing with Defensics: Q&A

The ins and outs of fuzz testing with Defensics: Q&A

| | Fuzz Testing, Webinars
In our webinar, we talked about preparing for zero-day attacks using fuzz testing, as well as Defensics system compatibility, fuzzing techniques, and more. The post The ins and outs of fuzz testing with Defensics: Q&A appeared first on Software Integrity Blog ... Read More
Seeker FAQ: Interactive application security testing and CI/CD

Seeker FAQ: Interactive application security testing and CI/CD

Our Seeker FAQ provides answers about Seeker IAST, active verification, integration into CI/CD pipelines, configuration, sensitive-data tracking, and more. The post Seeker FAQ: Interactive application security testing and CI/CD appeared first on Software Integrity Blog ... Read More
How to protect sensitive data with PCI DSS compliance

How to protect sensitive data with PCI DSS compliance

PCI DSS compliance can help you protect sensitive data and prevent data breaches. Step 1: Identify sensitive data and track how your applications handle it. The post How to protect sensitive data with PCI DSS compliance appeared first on Software Integrity Blog ... Read More