Key Metrics for the Application Security Testing (AST)

Key Metrics for the Application Security Testing (AST)

Application Security Testing ( AST ) are tools and services that helps you discover security vulnerabilities in all kinds of applications. Current application security practices/tools available broadly falls into following categories: Static Application Security Testing (SAST): Static application security testing tools analyzes the application source code to determine if vulnerabilities exist. IT is also referred toRead more about Key Metrics for the Application Security Testing (AST)[…]

Secure SDLC Program: “The Art of Starting Small”

Secure SDLC Program: “The Art of Starting Small”

I have seen several organizations trying to adopt secure SDLC and failing badly towards the beginning. One of the biggest reason is they try to use “Big Bang Approach”. Yeah, there are several consultants who will push you to go for a big project use the classical waterfall model to adopt secure SDLC. But that’s askingRead more about Secure SDLC Program: “The Art of Starting Small”[…]

Checklist: How to choose between different types of Application Security Testing Technologies?

Checklist: How to choose between different types of Application Security Testing Technologies?

This blog will provide the pros and cons of different types of Application Security Testing Technologies, and checklist to chose among them. Static Application Security Testing (SAST) SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.   ProsRead more about Checklist: How to choose between different types of Application Security Testing Technologies?[…]

CISO Viewpoint: Safe Penetration Testing

CISO Viewpoint: Safe Penetration Testing

Safe Penetration Testing – 3 Myths and the Facts behind them Penetration testing vendors will often make promises and assurances that they can test your Web Applications safely and comprehensively in your production environment. So when performing Penetration Testing of a Web Application that is hosted in a Production Environment you need to consider the following myths and factsRead more about CISO Viewpoint: Safe Penetration Testing[…]

SAST vs. DAST: How should you choose ?

SAST vs. DAST: How should you choose ?

This blog will provide information about SAST or Static Application Security Testing and DAST or Dynamic Application Security Testing. And also answer the common question of SAST vs DAST. What is SAST? SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need aRead more about SAST vs. DAST: How should you choose ?[…]

How to choose your Security / Penetration Testing Vendor?

How to choose your Security / Penetration Testing Vendor?

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization.Read more about How to choose your Security / Penetration Testing Vendor?[…]

Top 5 Application Security Technology Trends

Top 5 Application Security Technology Trends

Following are the top 5 Application Security Technology Trends: 1.    Run Time Application Security Protection (RASP) Today applications mostly rely on external protection like IPS (Intrusion Prevention Systems), WAF (Web Application Firewall)etc and there is a great scope for a lot of these security features being built into the application so that it can protect itselfRead more about Top 5 Application Security Technology Trends[…]

Must Know Business Logic Vulnerabilities In Banking Applications

Must Know Business Logic Vulnerabilities In Banking Applications

Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking, e-commerce, Manufacturing, Enterprise Applications, Gaming and so on. On one side, SQL Injection, XSS and CSRF vulnerabilities are still the top classes of vulnerabilities found by our automated scanning system,Read more about Must Know Business Logic Vulnerabilities In Banking Applications[…]

Penetration Testing for  E-commerce Applications

Penetration Testing for E-commerce Applications

Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendation algorithms are constantly running at the back end to make content searching as personalized as possible. Here we will learn about theRead more about Penetration Testing for E-commerce Applications[…]

Source Code Analysis- How to Remediate your Vulnerabilities

Source Code Analysis- How to Remediate your Vulnerabilities

The AppSec How -To:Visualizing and Effectively Remediating Your Vulnerabilities: The biggest challenge when working with Source Code Analysis (SCA) tools is how to effectively prioritize and fix the numerous results. Developers are quickly overwhelmed trying to analyze security reports containing results that are presented independently from one another.   Take for example, WebGoat – OWASP’s deliberately insecure Web application used as aRead more about Source Code Analysis- How to Remediate your Vulnerabilities[…]