Software Integrity Blog

Archive for the 'Interactive Application Security Testing (IAST)' Category

 

How does IAST fit into DevSecOps?

IAST, a new generation of application security testing that bridges the gaps between SAST, DAST, and pen testing, seems to have been made for DevSecOps.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST) | Comments Off on How does IAST fit into DevSecOps?

 

Which application security tools should you choose?

There’s no single silver bullet for application security. Instead, you need a combination of application security tools and services. Here’s an overview.

Continue Reading...

Posted in Application Security, Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), Static Analysis (SAST) | Comments Off on Which application security tools should you choose?

 

How DevOps security tools support modern applications

Modern application development organizations must integrate and automate DevOps security tools such as IAST into CI/CD pipelines to speed developers.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST) | Comments Off on How DevOps security tools support modern applications

 

How to choose application security vendors and tools

Unless you build your own AppSec tools, you need to know how to choose an application security vendor and whether to opt for individual tools or a suite.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Software Composition Analysis (SCA) | Comments Off on How to choose application security vendors and tools

 

Seeker FAQ: Interactive application security testing and CI/CD

Our Seeker FAQ provides answers about Seeker IAST, active verification, integration into CI/CD pipelines, configuration, sensitive-data tracking, and more.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST) | Comments Off on Seeker FAQ: Interactive application security testing and CI/CD

 

[Webinars] Secure your CI/CD pipelines with IAST and Synopsys Detect

Learn how interactive application security testing (IAST) fits into any CI/CD pipeline and how to secure your Azure CI/CD Pipelines with Synopsys Detect.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST), Webinars | Comments Off on [Webinars] Secure your CI/CD pipelines with IAST and Synopsys Detect

 

Your application security testing tool just got acquired. Now what?

A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on Your application security testing tool just got acquired. Now what?

 

What is continuous testing?

Continuous testing means testing an application continuously throughout the software life cycle. It’s a critical part of CI/CD and—like any other part—should be automated.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST) | Comments Off on What is continuous testing?

 

Q&A: Interactive application security testing (IAST) and Seeker

Do you have questions about IAST? We’ve got answers, explanations, and recommendations. Read our responses to audience questions from our last IAST webinar.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Webinars | Comments Off on Q&A: Interactive application security testing (IAST) and Seeker

 

[Webinars] Tech due diligence, IAST, and government software

Learn about the magic of IAST, how to uncover the risks of APIs and web services in M&A, and how DoD and government agencies can mitigate software risks.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Mergers & Acquisitions, Open Source Security, Software Compliance, Quality & Standards, Webinars | Comments Off on [Webinars] Tech due diligence, IAST, and government software