Threat Modeling & Risk Assessment for Developers
Threat modeling and risk assessment is a structured approach that enables an organization to identify, quantify, and address the threats…
Next-Level AppSec: Transforming Secure Development using Automation Platforms
As the rate of application adoption accelerates globally, teams are expected to produce software faster, and often under tight budget…
Reduce Cybersecurity Risks for Remote or Hybrid Work Environments
The shift to remote work has significantly impacted security threats, as organizations’ digital footprints expand and expose them to new…
Penetration Testing Execution Standards (PTES)
It’s all too common for AppSec companies to claim they offer vulnerability assessments when in fact they are just doing…
Rethinking Application Security: Why Penetration Testing Alone Doesn’t Cut It
In our increasingly digital world, applications are the engines driving businesses, powering critical operations and service delivery. However, these applications…
Unveiling New Additions to ASVS: Advancing the Frontier of Application Security
Today, we delve into the ongoing development of the Application Security Verification Standard (ASVS). If you’re new to ASVS, it…
AutoGQL: The Ultimate GraphQL Plugin for Burp’s Active Scanner
Have you ever stared at a GraphQL request, wishing Burp’s Active Scanner just ‘got’ where to put its payloads? Well,…
Cross-Site Scripting – An eXceSSive Discussion about XSS
Cross-site scripting (XSS) is a security concern that has persisted for over two decades in the world of application security.…
How to Get the Most Value from Your Security Tools
There are several big problems with automated security scanning tools.  In this post, we’ll discuss some of the major problems…
Simpilfying-NISTs-Guidance-for-US-Executive-Order-14028
Simplifying NIST’s Guidance for US Executive Order 14028: New Standards for Software Verification
This article is Part 2 of a two-part series – Part 1: US Executive Order 14028 Impact on Application &…