It’s critical to find the right managed services provider. Here are 6 things to consider when searching for the best provider to meet your business needs.
Tempted to cut your application security testing budget to cover shutdown losses? Remember that compromised assets are an even greater existential threat.
Posted in Application Security | Comments Off on Drop the knife and back away from the AppSec budget
A managed services partner should do more than run the tests you choose. The right partner will work with you to shape your application security program.
Our Complete Application Security Checklist describes 11 best practices that’ll help you minimize your risk from cyber attacks and protect your data.
Posted in Application Security | Comments Off on The Complete Application Security Checklist
Data protection requires application security. Threat modeling and vulnerability management help you secure your apps from development through production.
Learn why application security vulnerabilities are a serious consideration in tech due diligence and how to evaluate your security risk in M&A transactions.
Ghostcat (CVE-2020-1938) is an Apache Tomcat vulnerability that allows remote code execution in some circumstances. Here’s how to find and mitigate it.
Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time.
Posted in Application Security | Comments Off on Tips for working from home without losing your marbles or compromising security
Are you releasing software with legacy vulnerabilities that you put aside to address later but forgot about—or that you didn’t even know were in your code?
If you use an SCA tool, why should you use a SAST tool as well? Let’s discuss what each tool can and can’t do and how they complement each other.