security testing
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Take a dev-centric approach to cloud-native AppSec testing
The era of the cloud-native application is well and truly upon us: IDC researchers have predicted that by 2023, more that 500 million apps will be developed using cloud-native …
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094422/magnify-inspect1-400x200.jpg)
The importance of implementing security scanning in the software development lifecycle
Veracode published a research that finds most applications are now scanned around three times a week, compared to just two or three times a year a decade ago. This represents …
![programming](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095527/programming-400x200.jpg)
Low code applications are essential for cybersecurity development in applications
One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …
![Oxeye](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/02094501/oxeye-1200-400x200.jpg)
Product showcase: Oxeye.io – Cloud native application security testing
Delivering secure applications requires tooling built for automation in the modern tech stack. Oxeye provides a cloud-native application security testing solution that is …
![mobile security](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18175826/mobile_security-device-400x200.jpg)
A 2022 priority: Automated mobile application security testing
The use of mobile devices has skyrocketed in the past two years and with it the mobile app market. It’s predicted mobile apps will generate more than $935 billion in revenue …
![application](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27101818/application-blue-400x200.jpg)
The threats of modern application architecture are closer than they appear
Modern applications and software have evolved as the transition to the cloud was accelerated by widespread digital transformation, as enterprises of all sizes made heavy …
![cube](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103500/cube-400x200.jpg)
Regulation fatigue: A challenge to shift processes left
Recent high-profile supply chain attacks have heightened the need for increased regulation of the open-source community. In the U.S., for example, President Biden’s …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103509/IoT-400x200.jpg)
ETSI completes set of IoT MQTT and CoAP testing standards
The ETSI committee on Methods for Testing and Specifications (TC MTS) has recently completed a first set of seven standards addressing the testing of the IoT MQTT and CoAP …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
Most disaster recovery solutions are not tested on a regular basis
As organizations work diligently to support evolving business needs, while at the same time battling cybercrime and other threats to critical data, the majority of disaster …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093701/power-utilities-400x200.jpg)
Top security threats for power plants and how to proactively avoid them
Power plants are one of the most vitally important components of modern civilization’s infrastructure. A disruption in energy production impacts all aspects of society from …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
Counterfit: Open-source tool for testing the security of AI systems
After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations …
![mind map](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/30163653/mind_map-400x200.jpg)
MindAPI makes API security research and testing easier
Security researcher David Sopas has published a new open-source project: MindAPI, a mind map with resources for making API security research easier. “I love mind maps. …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege