Your application security testing tool just got acquired. Now what?

A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.
The post Your application security testing tool just got acquired. Now what? appeared fi… Continue reading Your application security testing tool just got acquired. Now what?

Q&A: Interactive application security testing (IAST) and Seeker

Do you have questions about IAST? We’ve got answers, explanations, and recommendations. Read our responses to audience questions from our last IAST webinar.
The post Q&A: Interactive application security testing (IAST) and Seeker appeared fi… Continue reading Q&A: Interactive application security testing (IAST) and Seeker

The Verizon DBIR and the art of the breach

An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights.
The post The Verizon DBIR and the art of the breach appeared first on Software Integrity Blog…. Continue reading The Verizon DBIR and the art of the breach