About the Author
Cybersecurity writer and blog managing editor at Invicti Security. Drawing on years of experience with security, software development, content creation, journalism, and technical translation, he does his best to bring web application security and cybersecurity in general to a wider audience.
MORE FROM THIS AUTHOR
What is DOM-based XSS (cross-site scripting)?
Complete beginner’s guide to web application security
How to evaluate web application security scanners
OWASP Top 10 2017 web application vulnerabilities
How to choose the right web security scanner to reduce false negatives
What are false negatives and why can automated web application security scanners fail to detect a vulnerability? This post explains what false negatives are and what to look for when searching for an automated web vulnerability scanner to ensure that it detects all vulnerabilities without leaving security gaps for malicious attackers to exploit.