Best way to handle Path Manipulation vulnerabilities with retrieving files from .appconfig?

I’m currently working on a task where I am trying to suppress some Path Manipulation warnings that have been raised from running an analysis with Fortify on my team’s source code. The issues are being raised due to the fact that we are try… Continue reading Best way to handle Path Manipulation vulnerabilities with retrieving files from .appconfig?

Sonatype + Muse: How Improved Code Quality Compliments Enterprise SAST

Last month Sonatype announced the acquisition of MuseDev, an innovative code analysis platform that does three things remarkably well:
The post Sonatype + Muse: How Improved Code Quality Compliments Enterprise SAST appeared first on Security Boule… Continue reading Sonatype + Muse: How Improved Code Quality Compliments Enterprise SAST

New Micro Focus, Sonatype Partnership Provides 360 Degree View of AppSec

In today’s world, we know that most security breaches occur because of application vulnerabilities. We also know that most typical software applications are, on average, comprised of 85% open source software. These facts are changing the way… Continue reading New Micro Focus, Sonatype Partnership Provides 360 Degree View of AppSec

Does application security assessments done using SaaS solutions (WhiteHat Sentinal and Fortify on Demand) count as penetration tests?

SaaS security solutions such as “WhiteHat Sentinal” and “Fortify on Demand”
are getting popular now a days. Methodologies of both describe them involving manual verification. Does this qualify the Application security asses… Continue reading Does application security assessments done using SaaS solutions (WhiteHat Sentinal and Fortify on Demand) count as penetration tests?