Black Hat 2021: What we don’t know may be the greatest cybersecurity threat
I always come away from the Black Hat USA cybersecurity conference having learned something new, feeling inspired, and imbued with just the right amount of angsty determination to do my part to help...
View ArticleSerious about web application security? Look both ways as you shift left
Shifting left has been a buzzword in the application security space for several years now, and with good reason – making security an integral part of development is the only practical approach for...
View ArticleUS government agencies given a new deadline to secure critical software
A recent memo from the US Office of Management and Budget gives agencies 60 days to identify and 12 months to secure their critical software. This explicitly includes web applications deployed...
View ArticleAugust 2021 update for Netsparker Enterprise On-Premises
This blog post announces the August 2021 update for Netsparker Enterprise On-Premises, highlighting multiple teams and granular permissions, SCIM 2.0 support, Jazz Team Server integration, and build...
View ArticleFix vulnerabilities faster with Netsparker’s 2-way Jira integration
Building vulnerability management into your development pipeline is a must when doing security testing in agile workflows. Ideally, developers should get security-related tickets directly into their...
View ArticleWhat to look for in a DAST solution
Choosing a DAST product that will work for your specific organization is crucial for your entire application security program. Read the highlights from the Invicti Web Application Security Buyer’s...
View ArticleNetsparker by Invicti exhibiting at 2021 Air, Space & Cyber Conference
Join Netsparker at booth #126 during the 2021 Air, Space & Cyber Conference to learn more about our comprehensive automated web application security solution. READ MORE
View ArticleThe pitfalls of DIY application security
Despite the clear and growing risk of web-based attacks and data breaches, many still see web application security as a low-priority newcomer to the cybersecurity mix. This often leads to incomplete...
View ArticleWhat Invicti’s agreement with TD SYNNEX means for customers
Invicti Security’s new agreement with TD Synnex brings our leading dynamic application security testing (DAST) tools to AppSec professionals with the scale and speed of a leading global distribution...
View ArticleStreamline your vulnerability response with Netsparker’s ServiceNow integration
Identifying vulnerabilities is only the first step in the long journey to making your web applications secure. To help you triage, assign, and remediate vulnerabilities, Netsparker can send accurate...
View ArticleThe new OWASP Top 10 is not what you think
For the first time since 2017, OWASP has a new list of Top 10 web application security risks – but if you were hoping for a vulnerability checklist, you will be disappointed. The OWASP Top 10 2021 is,...
View ArticleEfficient vulnerability remediation with Netsparker and DefectDojo
Improving application security might start with detecting vulnerabilities but does not end there. You also need to manage identified issues to ensure they are assigned and fixed, and Netsparker offers...
View ArticleWhy web asset discovery is a crucial part of your AppSec program
For all the talk about the advantages and shortcomings of various approaches to application security testing, web application security should start before you even run the first test. Web asset...
View ArticleTo build DevSecOps, you need both modern tools and cultural changes
The last few years have seen enterprises building security into their software development lifecycles, but similar efforts in the public sector face a number of unique challenges related to both...
View ArticleAccurate vulnerability scanning saves money – and we can prove it
99.98% – that’s the data-based accuracy of automatic vulnerability confirmation in Netsparker. With such reliable results provided for the vast majority of serious issues, you can truly automate your...
View ArticleNew Invicti Research Reveals Proof-Based Scanning Automatically Confirms 94%...
Invicti Security, a global innovator in application security, today announced the results of an extensive analysis of six years’ worth of real-world vulnerability data processed by Invicti’s Netsparker...
View ArticleNew research shows how Netsparker’s Proof-Based Scanning cuts through...
Automatic application security testing used to be synonymous with uncertain results that always needed manual verification, but modern vulnerability scanners have put a definite end to that era. This...
View ArticleWhat the OWASP Top 10 2021 categories mean for OWASP compliance
OWASP has officially released its list of top ten application security risks for 2021, with major changes compared to previous editions. Continuing from an earlier post examining the new approach,...
View ArticleWhat is server-side request forgery (SSRF) and how can you prevent it?
Server-side request forgery (SSRF) is an attack that allows attackers to send malicious requests to other systems via a vulnerable web server. Listed in the OWASP Top 10 as a major application security...
View ArticleCISA’s Zero Trust Maturity Model is a rallying cry for modern web app security
Increasingly sophisticated cyberattacks against federal agencies highlight the urgent need to enhance federal cybersecurity. To help with this, CISA has published the Zero Trust Maturity Model to...
View Article