Secure SDLC Program: “The Art of Starting Small”

Secure SDLC Program: “The Art of Starting Small”

I have seen several organizations trying to adopt secure SDLC and failing badly towards the beginning. One of the biggest reason is they try to use “Big Bang Approach”. Yeah, there are several consultants who will push you to go for a big project use the classical waterfall model to adopt secure SDLC. But that’s askingRead more about Secure SDLC Program: “The Art of Starting Small”[…]

Checklist: How to choose between different types of Application Security Testing Technologies?

Checklist: How to choose between different types of Application Security Testing Technologies?

This blog will provide the pros and cons of different types of Application Security Testing Technologies, and checklist to chose among them. Static Application Security Testing (SAST) SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.   ProsRead more about Checklist: How to choose between different types of Application Security Testing Technologies?[…]

CISO Viewpoint: Safe Penetration Testing

CISO Viewpoint: Safe Penetration Testing

Safe Penetration Testing – 3 Myths and the Facts behind them Penetration testing vendors will often make promises and assurances that they can test your Web Applications safely and comprehensively in your production environment. So when performing Penetration Testing of a Web Application that is hosted in a Production Environment you need to consider the following myths and factsRead more about CISO Viewpoint: Safe Penetration Testing[…]

SAST vs. DAST: How should you choose ?

SAST vs. DAST: How should you choose ?

This blog will provide information about SAST or Static Application Security Testing and DAST or Dynamic Application Security Testing. And also answer the common question of SAST vs DAST. What is SAST? SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need aRead more about SAST vs. DAST: How should you choose ?[…]

How to choose your Security / Penetration Testing Vendor?

How to choose your Security / Penetration Testing Vendor?

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization.Read more about How to choose your Security / Penetration Testing Vendor?[…]

Top 5 Application Security Technology Trends

Top 5 Application Security Technology Trends

Following are the top 5 Application Security Technology Trends: 1.    Run Time Application Security Protection (RASP) Today applications mostly rely on external protection like IPS (Intrusion Prevention Systems), WAF (Web Application Firewall)etc and there is a great scope for a lot of these security features being built into the application so that it can protect itselfRead more about Top 5 Application Security Technology Trends[…]

Must Know Business Logic Vulnerabilities In Banking Applications

Must Know Business Logic Vulnerabilities In Banking Applications

Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking, e-commerce, Manufacturing, Enterprise Applications, Gaming and so on. On one side, SQL Injection, XSS and CSRF vulnerabilities are still the top classes of vulnerabilities found by our automated scanning system,Read more about Must Know Business Logic Vulnerabilities In Banking Applications[…]

Penetration Testing for  E-commerce Applications

Penetration Testing for E-commerce Applications

Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible. Here we will learn about theRead more about Penetration Testing for E-commerce Applications[…]