IAST, IaC, Secrets: A Guide to App Sec Tools

Image by S. Hermann & F. Richter from Pixabay
We covered several acronyms common in application security in a previous post: SAST, DAST, and SCA. We’ll continue our discussion on AppSec concepts today by focusing on IAST, IaC, and secrets.
Interact… Continue reading IAST, IaC, Secrets: A Guide to App Sec Tools

Developer Education: Learning to Secure Code on Demand

Scanning your code base frequently to discover security risk early in development gives engineers more time time to address issues. But security risk is a challenging issue and most developers need more than just time.
Consider:

Over 60% of identified… Continue reading Developer Education: Learning to Secure Code on Demand

How to Start Tracking Your Application Dependencies

Photo by Luis Gomes from Pexels
Do you know what dependencies your app is using? All of them? We recently wrote about managing npm dependencies, but Node.js developers aren’t the only ones who rely on third-party libraries, APIs, and more in their appl… Continue reading How to Start Tracking Your Application Dependencies