Invicti DAST-to-SAST correlation: Fix verified runtime risks at pipeline speed
The Helix Files: Choose Your Own Adventure
Protecting the APIs of Modern Applications
Empowering Developers in AppSec: Triage and Collaboration
HTTP security headers: An easy way to harden your web applications
The OWASP API Security Top 10 demystified
Enhancing Vulnerability Management with Threat Intelligence
What’s the big deal with post-quantum cryptography?
How the DORA framework mandates application security testing (and many other things)