SAST vs DAST vs IAST
I would think most would agree that it wouldn’t be too much of a stretch to draw the parallel between security tools and medicines and threats as diseases which brings us to ...

More than 40 billion records exposed in 2021
Pravin Madhani, CEO and Co-Founder | | Application Security, AppSec, Cyber Security, NIST, owasp, rasp, shadow code, Uncategorized, Vulnerabilities
Security Brief Asia is reporting on new research showing more than 40 billion records were exposed by data breaches in 2021. According to the research from Tenable's Security Response Teams, they found ...

A Quick Look at the New OWASP Top 10 for 2021
Pravin Madhani, CEO and Co-Founder | | Application Security, AppSec, Cyber Security, NIST, owasp, rasp, shadow code, Uncategorized, Vulnerabilities
Back in September of 2021 we wrote that the OWASP working group had a draft of latest Top 10 Web Application Security Risks, their first update since the 2017 revision. The working ...

The Final Count: Vulnerabilities Up Almost 10% in 2021
Pravin Madhani, CEO and Co-Founder | | Application Security, AppSec, Cyber Security, NIST, NVD database, owasp, rasp, shadow code, Uncategorized, Vulnerabilities
ow that 2021 has ended, we can see the final tally of vulnerabilities recorded for 2021. The year ended with a total of 20,061 vulnerabilities recorded, 9.3% over the prior year and ...

93% of Tested Networks Vulnerable to Breach
Pravin Madhani, CEO and Co-Founder | | Application Security, AppSec, Cyber Security, NIST, owasp, rasp, shadow code, Uncategorized, Vulnerabilities
Nearly every organization can be infiltrated by cyber attackers, based on data from dozens of penetration tests and security assessments. The vast majority of businesses can be compromised within a month by ...

K2 can protect against Log4J without patching
Alex Begun, Chief Revenue Officer | | Application Security, AppSec, Cyber Security, IAST, Interactive Application Security Testing, Uncategorized, Vulnerabilities
The Log4J vulnerability has been given a CVSS Score of 10, making it the most serious of discovered flaws. VentureBeat is reporting that Log4J attacks have been attempted on 44% of corporate networks. Find out how to protect against Log4J attacks. The post ...

Runtime Application Security: Made to Protect Against LOG4J2 Attacks
Jayant Shukla, CTO & Co-Founder | | Application Security, AppSec, Cyber Security, owasp, rasp, Uncategorized, US-CERT, Vulnerabilities, vulnerability database
A recently discovered vulnerability in LOG4J2 (also referred to as LOG4SHELL) is being widely reported as one of the most dangerous vulnerabilities in application software to date. There is already news that ...

Can Your IAST Do This?
Alex Begun, Chief Revenue Officer | | Application Security, AppSec, Cyber Security, IAST, Interactive Application Security Testing, Uncategorized, Vulnerabilities
While Interactive Application Security Testing (IAST) is still a relatively new technology from the perspective of adoption, it has been around for over 10 years and some of the aspects and capabilities around IAST are well understood, such as ...

Fifth Record Year in a Row for Vulnerabilities
Pravin Madhani, CEO and Co-Founder | | Application Security, AppSec, Cyber Security, owasp, rasp, Uncategorized, US-CERT, Vulnerabilities, vulnerability database
On December 8, 2021 we just hit another milestone with the number of vulnerabilities recorded in the US CERT Vulnerability Database (so far in 2021) exceeding the total count in 2020, marking ...

Cyber Security Predictions for 2022
Pravin Madhani, CEO and Co-Founder | | Application Security, AppSec, Cyber Security, NIST, owasp, rasp, shadow code, Uncategorized, Vulnerabilities
As we approach the end of 2021, we’d like to present our predictions for 2022 for the application security community. It would be easy to just predict that cyber attacks will continue ...