Your application security testing tool just got acquired. Now what?
A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.
Asma Zubair is a seasoned product leader with extensive experience managing and launching products and services in the application security and application protection space. At Synopsys, Asma manages Seeker, the industry’s first IAST solution with active verification and sensitive-data tracking for web-based applications. Prior to Synopsys, Asma led teams at WhiteHat Security, The Find (Facebook), and Yahoo!. Asma holds a degree in electrical engineering from IIT in India and an MBA from UC Berkeley’s Haas School of Business.
A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.
Do you have questions about IAST? We’ve got answers, explanations, and recommendations. Read our responses to audience questions from our last IAST webinar.
Posted in Interactive Application Security Testing (IAST), Webinars
An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights.
Posted in Data Breach Security, Software Architecture & Design