Application Security

The Importance of Zero Trust in Cybersecurity
What Does Zero Trust Mean in Cybersecurity? Zero trust is a security model in cybersecurity that operates on the assumption…
The Crucial Role of Threat Modeling in Application Security
Threat modeling is a proactive approach aimed at identifying potential threat scenarios specific to your application. Following threat modeling is…
Penetration Testing Execution Standards (PTES)
It’s all too common for AppSec companies to claim they offer vulnerability assessments when in fact they are just doing…
Rethinking Application Security: Why Penetration Testing Alone Doesn’t Cut It
In our increasingly digital world, applications are the engines driving businesses, powering critical operations and service delivery. However, these applications…
Unveiling New Additions to ASVS: Advancing the Frontier of Application Security
Today, we delve into the ongoing development of the Application Security Verification Standard (ASVS). If you’re new to ASVS, it…
AutoGQL: The Ultimate GraphQL Plugin for Burp’s Active Scanner
Have you ever stared at a GraphQL request, wishing Burp’s Active Scanner just ‘got’ where to put its payloads? Well,…
Cross-Site Scripting – An eXceSSive Discussion about XSS
Cross-site scripting (XSS) is a security concern that has persisted for over two decades in the world of application security.…
How to Get the Most Value from Your Security Tools
There are several big problems with automated security scanning tools.  In this post, we’ll discuss some of the major problems…
Simpilfying-NISTs-Guidance-for-US-Executive-Order-14028
Simplifying NIST’s Guidance for US Executive Order 14028: New Standards for Software Verification
This article is Part 2 of a two-part series – Part 1: US Executive Order 14028 Impact on Application &…
How-to-Overcome-Common-Challenges-with-SDLC
How to Overcome Common Challenges with SDLC
Does this sound familiar? Less than 1,000 staff Small (or zero) security team other than CISO Have DevOps, but no…