Damien BurksProdamienjburks.com·Apr 6, 2024Exploring the World of SAST and DAST with a DevSecOps TwistIntroduction As a Cloud Security Engineer deeply immersed in the world of Application Security and DevSecOps, nothing excites me more than sharing my knowledge and passion for safeguarding applications against the myriad of cyber threats lurking in t...Discuss·6 likes·74 readsDAST
Emtwenty Co.blog.emtwenty.co·Mar 22, 2024SAST vs DAST vs SCAStatic Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA) represent distinct approaches to ensuring application security, each with its own strengths and limitations. SAST involve...Discuss·1 likeSAST
Mike Elissenblog.securitylevelup.eu·Mar 13, 2024Testing APIs, from a security angle...API microservices have become a mainstay in the world of internet architecture. Roughly 31% of all the requests seen by Akamai are related to APIs which in turn has led to a tremendous increase in API attacks. In 2023 alone, Akamai saw a 2.5x growth ...Discuss·1 like·140 readsAPIs
Anshumansinghanshuman.hashnode.dev·Mar 10, 2024How Aikido helps in securing your Codebase!With a rise in multiple SaaS startups growing around the world, companies are in more need of solutions that can help them in making their systems secure. As a result, we have seen a good number of organizations emerging, which provide security testi...Discuss·21 likes·45 readsSAST
Pramoth Ravipramoth.hashnode.dev·Feb 28, 2024DevSecOps :Project- SAST-SCA-DAST-K8'sIntroduction: DevSecOps represents a methodology within software development that prioritizes the integration of security measures across the entire lifecycle of software development. This approach, encapsulated in the acronym DevSecOps, emphasizes t...Discuss·45 readsbuggy
The Revieww Companyvariable.hashnode.dev·Nov 18, 2023DAST vs SASTStatic Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) are pivotal methodologies within application security, each serving a unique purpose in identifying and remediating vulnerabilities in software applications. S...DiscussSecurity
Shubham Nimkarshubnimkar.hashnode.dev·Sep 2, 2023Install Sonarqube server on AWS Ubuntu instance using docker-composeIn this brief article, we will explore how to install and configure the Sonarqube server along with the PostgreSQL database in an Ubuntu instance running in AWS using docker-compose. Let’s get started!! Step-1: Create an AWS Ubuntu instance Login to ...Discuss·27 readssonarqube
muhammad zubairmuhammadzubair.hashnode.dev·Aug 30, 2023🛡️ Exploring Essential DevSecOps Tools for Secure DevelopmentIn the rapidly evolving landscape of software development, ensuring security is no longer an afterthought; it's an integral part of the development process. DevSecOps, the fusion of development, security, and operations, emphasizes incorporating secu...DiscussDevSecOps
Hung Ngohungoboss.hashnode.dev·Aug 25, 2023SAST, DAST, IAST and RASP, what's the difference?In the application security world, we often use a lot of fancy catchphrases and abbreviations that might leave some people flummoxed. I have struggled with the initial understanding which is why I have decided to put together this short and simple ar...Discuss·84 readsappsec
Razvan Morarukubiko.hashnode.dev·Apr 16, 2023The importance of container scanning in cybersecurityIn recent years, container technology has gained immense popularity in the software development world, revolutionizing the way applications are built and deployed. Containers, which are lightweight and easily portable, enable developers to package so...Discusscontainers