Second wave of Shai-Hulud npm worm compromises the global software supply chain
7 steps to avoid uncoordinated vulnerability disclosure
What automation means in application scanning tools – and why you need it
Dynamic code analysis: What it is and isn’t in application security testing
5 reasons why web security is crucial to avoid ransomware
How to choose a DAST solution: An 8-step evaluation checklist
SSRF vulnerabilities caused by SNI proxy misconfigurations
SAST vs. DAST: How to compare web application security testing tools
Updates to ISO 27001/27002 raise the bar on application security and vulnerability scanning