


Cache bypass techniques for time-based SQL injection

Debunking the top 5 myths about DAST

HTTP security headers: An easy way to harden your web applications

How bad is a missing Content-Type header?

How to choose the right application security tools

What is DevSecOps and how is it evolving?

5 reasons why proof-based scanning is a game-changer

5 reasons why continuous vulnerability testing and management beats ad-hoc scanning

Exploiting insecure exception logging

Baking AppSec into your cybersecurity budget: A recipe for efficient risk reduction
