Guide: Rethinking application security risk for federal agencies
Under pressure to comply with security mandates and make rapid improvements to their security posture, federal organizations are looking for solutions and approaches that combine broad visibility with...
View ArticleNew research finds 73% of organizations will increase AppSec investment in 2023
In difficult economic times with the increased risk of bad-actor threats, it’s critical that organizations prioritize investing in zero noise, modern AppSec solutions that demonstrate ROI with...
View ArticleVulnerabilities a routine part of web application releases, survey finds
Teaming up once again with Wakefield Research for the Fall 2022 edition of the Invicti AppSec Indicator, we’ve found that 74% of companies frequently or routinely release software that contains...
View ArticleInvicti Malta Cybersecurity Roadshow 2022 at MCAST
At Invicti, we want to be a pillar of the local community, wherever that might be. Our local teams feel driven to give back to communities and embark on initiatives that help us meet this goal. We...
View ArticleCybersecurity awareness is for life, not just for October
For the past 30 days, you’ve likely been inundated with topical reminders about the importance of cybersecurity in all its shapes and aspects. Now, as Cybersecurity Awareness Month draws to a close,...
View ArticleOpenSSL 3.0.0–3.0.6 vulnerabilities: Less Heartbleed, more paper cut
Invicti’s Chief Technology Officer and Head of Security Research, Frank Catucci, co-authored this article. Invicti has assessed the risk to its hosted products Invicti Enterprise (formerly Netsparker)...
View ArticlePath traversal in Java web applications – announcing the Invicti technical paper
Path traversal/directory traversal vulnerabilities allow malicious hackers to abuse user input to access files on the web server or the application server and obtain sensitive information. The most...
View ArticleWhat you should know about cloud workload protection platforms (CWPP)
The transition to the cloud – and the accompanying transformation in the way applications are developed and deployed – created a need for new security tools. Cloud workload protection platforms (CWPP)...
View ArticleInvicti’s automated DAST turns heads at it-sa Expo&Congress 2022
At the end of October 2022, the Invicti crew attended it-sa Expo&Congress – one of the biggest IT security events in Germany and Europe in general. Among the many excellent conversations with...
View ArticleThe future of cybersecurity: DAST solutions, SBOMs, and APIs to take center...
We all wish we had a cybersecurity crystal ball that would give us deep insight into what’s coming next. From fresh exploits to new attack vectors, things change fast – and those sudden ebbs and flows...
View Article