Red Hat Consulting GitLab breach raises concerns over customer data exposure
What’s coming in the OWASP API Security Top 10 for 2023
Application security starts with thoughtful design and development
IDOR, you DOR, everybody DOR: The dangers of direct object references
U.S. cybersecurity strategy announces 5 pillars to bolster software security
ISO 27001 insists application security must start with secure coding practices
To protect against ransomware, secure your entire web attack surface
Future-proofing DevSecOps in healthcare with DAST
Why business-critical apps need DAST