Web Application Security
Frontend Developers: Security Champions of the New Age
Web development has undergone dramatic changes since its inception. However, one pervasive problem still exists: Frontend developers are still required to lean on backend developers to use APIs, write backend code or ...
Security Boulevard
A step-by-step guide to preventing credit card skimming attacks
Eyal Katz | | Code tutorials, Compliance, data protection, security boulevard, Web Application Security
If you read the news, you’ve encountered the term “Magecart” multiple times in recent years. The term refers to several hacker organizations that use online skimming The post A step-by-step guide to ...
Top 10 CNAPP Software Vendors for 2023
As a developer or member of a DevOps team, you probably know the stress and satisfaction of pouring your heart and soul into developing a groundbreaking The post Top 10 CNAPP Software ...
What is SSDLC (Secure Software Development Lifecycle) and 6 Steps to Take Now
The pressure to ship software faster to meet market demands is compromising security in a big way. As cyber criminals find ways to use the glaring The post What is SSDLC (Secure ...
10 Steps to Take Now to Reduce Supply Chain Risks
Open-source software has been a godsend for the development community. They bring lower development costs, faster application delivery, and greater flexibility; it’s no wonder nearly 90% The post 10 Steps to Take ...
How to Run a SAST test: The Dev Tutorial
If you prioritize long-term security and success, you should be analyzing your applications from the inside out. Enter Static Application Security Testing (SAST), a proactive method The post How to Run a ...
Top 8 Software Composition Analysis (SCA) Tools for 2023
Eyal Katz | | developer-tools, DevSecOps, Open Source Security, security boulevard, Web Application Security
The software development landscape moves quickly. As organizations seek to innovate at increasing speed, developers find ways to develop and deploy digital apps faster. More than The post Top 8 Software Composition ...
Why cross-site scripting still matters
Charlotte Freeman | | Application security best practices, Application security program strategy and planning, Managing security risks, Web Application Security
With web application exploits the 3rd-most-common cybersecurity threat, overlooking the importance of XSS vulnerabilities puts you at risk ...
7 Battle-Tested Tips for Using a DAST Scanner
While modern web applications are growing in complexity, the threat landscape is also constantly evolving. It can be difficult for developers to identify and remediate vulnerabilities The post 7 Battle-Tested Tips for ...
Top 10 Most Common Software Supply Chain Risk Factors
Imagine a world where a single line of code, tucked away in a common library or framework, could bring your entire digital world to a screeching The post Top 10 Most Common ...