16 Application Security Trends That You Can’t Ignore In 2016

16 Application Security Trends That You Can’t Ignore In 2016

Application Security has emerged over years both as a market as well as a technology. Some of the key drivers had been the explosion in the number of applications (web and mobile), attacks moving to the application layer and the compliance needs. Following are 16 Application Security Trends which we believe the industry will observeRead more about 16 Application Security Trends That You Can’t Ignore In 2016[…]

8 Questions to ask your Application Security Testing Provider !

8 Questions to ask your Application Security Testing Provider !

Choosing the right Application Security Testing Service Provider is not always an easy task. By asking the right questions and knowing what answers to look for, you can conduct the thorough evaluation of the various vendors available in the market and make the most intelligent choice for your business.There are numerous options like buying tools, using cloudRead more about 8 Questions to ask your Application Security Testing Provider ![…]

4 Areas where Artificial Intelligence Fails in Automated Penetration Testing

4 Areas where Artificial Intelligence Fails in Automated Penetration Testing

Formal Modeling and Automation is one of the things I love. I try to model everything and sometimes modeling helps and sometime it lands me in trouble. It helped me when I tried to model Penetration Testing and worked with my co-founder to design our first version of automated Penetration Testing Tool at iViZ. Where itRead more about 4 Areas where Artificial Intelligence Fails in Automated Penetration Testing[…]

10 questions to ask before you start your Bug Bounty program…

10 questions to ask before you start your Bug Bounty program…

Bug bounty programs are quite common these days with several of the biggest names in the industry have launched various avatars of the program. I have been asked by a few security managers and managements about should they launch a bug bounty program. Definitely bug bounty program has the advantage of crowd sourcing. However anRead more about 10 questions to ask before you start your Bug Bounty program…[…]

Checklist To Assess The Effectiveness Of Your Vulnerability Management Program

Checklist To Assess The Effectiveness Of Your Vulnerability Management Program

From our experience of helping organisations in building their ‘Vulnerability Management’ program, we feel that one of the major challenge the security manager/management faces does not always know the reality on the grounds. Obviously, the management is extremely busy and has got too many priorities. It is natural to get into managing whirlwinds. So, IRead more about Checklist To Assess The Effectiveness Of Your Vulnerability Management Program[…]

How to benchmark a web application security scanner?

How to benchmark a web application security scanner?

There is a plethora of web application scanner; every one of which claims to be better than the other. It is indeed a challenge to differentiate between them. We need to benchmark the application scanner against hard facts and not marketing claims. Below are some of the most critical metrics against which you would like to benchmark webRead more about How to benchmark a web application security scanner?[…]

Top 7  Vendors in Application Security Testing (AST) market at RSAC 2017

Top 7 Vendors in Application Security Testing (AST) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.   Application security testing are tools and services that helps you discover security vulnerabilities in all kinds of applications. Current application security practices/tools available broadly falls intoRead more about Top 7 Vendors in Application Security Testing (AST) market at RSAC 2017[…]