The Acunetix REST API

The Acunetix REST API

In addition to the user-friendly Acunetix user interface, all Acunetix functionality is also available through a built-in REST API. The REST API is available immediately upon installation and requires no configuration at all. All you need to do is open the Acunetix GUI to get... Read more The post The ... Read More
Web API Security with Acunetix

Web API Security with Acunetix

It’s no secret – application programming interfaces are everywhere. Many complex web applications are based on microservices, which use APIs to work with one another. Mobile apps and IoT devices also use APIs to communicate with their back-ends. Not to mention that almost every online... Read more The post Web ... Read More
Why Developers Shun Security and What You Can Do about It

Why Developers Shun Security and What You Can Do about It

The Linux Foundation and the Laboratory for Innovation Science at Harvard recently released a Report on the 2020 Free/Open-Source Software Contributor Survey. One of the primary conclusions of this report was the fact that free/open-source software developers often have a very negative approach to security.... Read more The post Why ... Read More
5 Common Web Application Security Sales Pitches

5 Common Web Application Security Sales Pitches

The world of IT security is very complex. There are few people who understand it. Security vendors take advantage of this and often try to sell their products and services by using pitches. Here are some common examples related to web application security. “Our Tool... Read more The post 5 ... Read More
2020 – The Year in Review

2020 – The Year in Review

The year 2020 won’t go down in history as one of the best, for sure. However, it has actually led to some positive developments. Let us take a look at 2020 in the world of web application security, share our own experiences, and point out... Read more The post 2020 ... Read More
Acunetix Stance on the SolarWinds Hack

Acunetix Stance on the SolarWinds Hack

We at Acunetix and Invicti are deeply concerned with the aftermath of the SolarWinds hack and offer our deepest commiserations to all the security personnel who are facing this situation just before Christmas, and to SolarWinds themselves who have been an unwilling agent to the... Read more The post Acunetix ... Read More
5 Reasons Why Web Security Is as Important as Endpoint Security

5 Reasons Why Web Security Is as Important as Endpoint Security

Would you say that your company is secure if your employees are using laptops with no anti-malware installed at all? Most businesses would say that is an irresponsible approach. Then why would many businesses have websites and web applications with no protection at all? An... Read more The post 5 ... Read More
3 reasons why DAST is the best way to begin the web application security journey

3 reasons why DAST is the best way to begin the web application security journey

To fully secure your web applications, you need several software solutions, specialist internal resources, and external contractors. However, this means significant costs, and not everyone can afford it all at once. How should small businesses start their web application security journey? Let’s have a look... Read more The post 3 ... Read More
5 Reasons Not to Rely on Bounty Programs

5 Reasons Not to Rely on Bounty Programs

Congratulations! You’ve made the right decision to start a bounty program. Does that mean that you can maintain a secure posture without a web vulnerability scanner and manual penetration tests? And if not, why not? Many companies are jumping on the bounty program bandwagon and... Read more The post 5 ... Read More
Are You Keeping Up with Web Application Security?

Are You Keeping Up with Web Application Security?

Opinion: Almost every business that has computers buys an antivirus solution. However, relatively few businesses that have their own websites buy vulnerability scanners. I believe that most people don’t buy solutions to protect their web applications not because they don’t feel that it’s necessary but... Read more The post Are ... Read More

Secure Guardrails