Software Integrity Blog

Archive for the 'Interactive Application Security Testing (IAST)' Category

 

Seeker: Bringing security testing to QA

Security testing in QA was once difficult to achieve, but the advent of interactive application security testing makes it a reality for many organizations.

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on Seeker: Bringing security testing to QA

 

8 must-have features in an IAST solution

With so many vendors to choose from, finding the perfect IAST solution for your organization’s needs can be difficult. Here’s a checklist of 8 must-have features for any good IAST tool.

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on 8 must-have features in an IAST solution

 

IAST defined, plus how it is impacting business-critical software

This article was originally published in Forbes. As one of the endless number of acronyms in the software security industry, IAST doesn’t have much going for it—it’s awkward to pronounce and it’s hard to guess what it stands for. But what is important, of course, is what a string of letters does stand for. And […]

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on IAST defined, plus how it is impacting business-critical software

 

Webinar: The future of application security: Enable DevSecOps with IAST

In our on-demand IAST webinar with Amy DeMartine (Forrester) and Ofer Maor (Synopsys), you’ll learn how to determine whether IAST is right for your organization.

Continue Reading...

Posted in General, Interactive Application Security Testing (IAST), Webinars | Comments Off on Webinar: The future of application security: Enable DevSecOps with IAST

 

The intersection between IAST and SCA and why you need both in your security toolkit

Interactive application security testing (IAST) and software composition analysis (SCA) are powerful technologies—and you need both in your security toolkit.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST), Software Composition Analysis | Comments Off on The intersection between IAST and SCA and why you need both in your security toolkit

 

Wading through the alphabet soup of application security testing tools: A guide to SAST, IAST, DAST, and RASP

Every application security testing tool—SAST, IAST, DAST, and RASP—has its distinct advantages, but you’ll get the best results when you use them together.

Continue Reading...

Posted in General, Interactive Application Security Testing (IAST), Static Analysis (SAST), Web Application Security | Comments Off on Wading through the alphabet soup of application security testing tools: A guide to SAST, IAST, DAST, and RASP

 

Seeker is a better IAST tool—You can count the ways

The need for web apps to be secure is demonstrated at least weekly, if not daily. At the end of June, just two of several examples were the U.K. branch of the ticket-selling giant Ticketmaster, breached because of vulnerable code on its payments page, and a collection of around 4,000 hotels that relied on booking […]

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on Seeker is a better IAST tool—You can count the ways

 

IAST—A better bugtrap

Everybody’s heard the cliché that if you build a better mousetrap, the world will beat a path to your door. The same applies to building a better bugtrap—as in software bug. Which is why developers ought to be beating a path to a tool that offers a better way to find bugs during the SDLC […]

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on IAST—A better bugtrap

 

How RASP complements application security testing to minimize risk

In the era of agile development and outsourcing, implementing a secure software development life cycle (SSDLC) is critical. However, it may not help you achieve the level of risk mitigation you desire. You may need to extend your software security approach to provide an additional layer of protection for applications once they have been deployed. […]

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Static Analysis (SAST), Web Application Security | Comments Off on How RASP complements application security testing to minimize risk

 

Join Synopsys at codenomi-con and Black Hat USA 2018

Black Hat USA is returning to Mandalay Bay, Las Vegas, Nevada, this August, beginning with four days of technical trainings, followed by the two-day main conference Aug. 8–9. For 21 years Black Hat USA has been an important information security event, so of course we’ll be there—don’t miss us in Booth 128. Plus our director […]

Continue Reading...

Posted in General, Interactive Application Security Testing (IAST) | Comments Off on Join Synopsys at codenomi-con and Black Hat USA 2018