Application security

How SQL injection attacks work: Examples and video walkthrough

Injection attacks are the number one security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them.

Securing the Kubernetes cluster

Explore common security best practices to ensure that your Kubernetes cluster is properly secured.

How to run a software composition analysis tool

Learn the pros and cons of software composition analysis (SCA) and how it can help protect your application from attacks.

How to run a SAST (static application security test): tips & tools

Learn the pros and cons of static application security testing (SAST) and how it can help protect your application from attacks.

How to run an interactive application security test (IAST): Tips & tools

Learn the pros and cons of interactive application security testing (IAST) and how it can help protect your application from attacks.

How to run a dynamic application security test (DAST): Tips & tools

Learn the pros and cons of dynamic application security testing (DAST) and how it can help protect your application from attacks.

Introduction to Kubernetes security

Get an overview of Kubernetes security, including Kubernetes architecture, control plane components, worker node components and more.

Key findings from ESG’s Modern Application Development Security report

A deep dive into security issues In August 2020, the Enterprise Strategy Group (ESG) published its report, “Modern Application Development Security.” ESG is

Microsoft’s Project OneFuzz Framework with Azure: Overview and concerns

In September 2020, the Microsoft Security Team announced that Microsoft’s new open-source fuzzing platform, Project OneFuzz, was available as an open-source

Software maturity models for AppSec initiatives

Introduction Software is on the front lines of security: a 2019 report from GitLab found that almost half of respondents deploy software on-demand or multip