Red Hat Consulting GitLab breach raises concerns over customer data exposure
The future of cybersecurity: DAST solutions, SBOMs, and APIs to take center stage
Invicti’s automated DAST turns heads at it-sa Expo&Congress 2022
What you should know about cloud workload protection platforms (CWPP)
Path traversal in Java web applications – announcing the Invicti technical paper
OpenSSL 3.0.0–3.0.6 vulnerabilities: Less Heartbleed, more paper cut
Cybersecurity awareness is for life, not just for October
Vulnerabilities a routine part of web application releases, survey finds
Guide: Rethinking application security risk for federal agencies