Software Integrity Blog

Archive for the 'Interactive Application Security Testing (IAST)' Category

 

[Webinars] Secure your CI/CD pipelines with IAST and Synopsys Detect

Learn how interactive application security testing (IAST) fits into any CI/CD pipeline and how to secure your Azure CI/CD Pipelines with Synopsys Detect.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Financial Services Security, Interactive Application Security Testing (IAST), Webinars | Comments Off on [Webinars] Secure your CI/CD pipelines with IAST and Synopsys Detect

 

Your application security testing tool just got acquired. Now what?

A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on Your application security testing tool just got acquired. Now what?

 

What happens when your CISO has one of those days?

A CISO having a bad day finds out the hard way that cutting corners on software security testing might end up costing him more than he saved.

Continue Reading...

Posted in Cloud Security, Interactive Application Security Testing (IAST), Maturity Model (BSIMM), Mobile Application Security, Open Source Security, Security Training, Software Architecture and Design, Software Composition Analysis | Comments Off on What happens when your CISO has one of those days?

 

What is continuous testing?

Continuous testing means testing an application continuously throughout the software life cycle. It’s a critical part of CI/CD and—like any other part—should be automated.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST) | Comments Off on What is continuous testing?

 

Q&A: Interactive application security testing (IAST) and Seeker

Do you have questions about IAST? We’ve got answers, explanations, and recommendations. Read our responses to audience questions from our last IAST webinar.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Webinars | Comments Off on Q&A: Interactive application security testing (IAST) and Seeker

 

[Webinars] Tech due diligence, IAST, and government software

Learn about the magic of IAST, how to uncover the risks of APIs and web services in M&A, and how DoD and government agencies can mitigate software risks.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Mergers & Acquisitions, Open Source Security, Security Standards and Compliance, Webinars | Comments Off on [Webinars] Tech due diligence, IAST, and government software

 

How to protect sensitive data with PCI DSS compliance

PCI DSS compliance can help you protect sensitive data and prevent data breaches. Step 1: Identify sensitive data and track how your applications handle it.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Security Standards and Compliance | Comments Off on How to protect sensitive data with PCI DSS compliance

 

Seeker: Bringing security testing to QA

Security testing in QA was once difficult to achieve, but the advent of interactive application security testing makes it a reality for many organizations.

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on Seeker: Bringing security testing to QA

 

8 must-have features in an IAST solution

With so many vendors to choose from, finding the perfect IAST solution for your organization’s needs can be difficult. Here’s a checklist of 8 must-have features for any good IAST tool.

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on 8 must-have features in an IAST solution

 

IAST defined, plus how it is impacting business-critical software

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on IAST defined, plus how it is impacting business-critical software