Red Hat Consulting GitLab breach raises concerns over customer data exposure
Never trust, always check: Catching partial fixes and buggy patches
Input Validation Errors: Vulnerability, Examples, Fixes, Missing Input, and more
How to ensure REST API security
DAST, IAST, SCA security testing: Deeper coverage in a single scan
The cutting-edge conundrum: Why federal agencies can’t compromise on security
AppSec best practices for security that sticks
How to avoid API blind spots in web application security testing
Common authentication and authorization vulnerabilities (and how to avoid them)