© 2023 Hashnode
#security-testing
API security concerns have significantly increased with the rapid adoption of APIs in cloud, web, and mobile applications. Research conducted by 451 Research on the state of API security in 2022, note…
As your career progresses, you'll have more chances to acquire new knowledge and skills in a changing field. People around you will frequently ask you questions at some point. Do individuals frequentl…
When looking for the right tool set for DevSecOps practice, tool selection is often a teamwork effort and it usually starts with the team finding out what they are currently working on. Which tools have been previously used, why a new one i…
DevSecOps for Leaders Introduction In a world where security is a top priority, DevSecOps has emerged as one of the most successful ways to ensure that your company's digital assets are protected. At …
Agile does not mention security, and customers have raised concerns about it in the past. It's easy to imagine a scenario in which an application fulfilled all customer's needs but also enclosed significant security vulnerabilities because …
Since security is one of the most crucial components of our lives, the idea of security is not new today. It has always been a component to take into account while making decisions. For example, we al…
Open-Source security testing tools for web applications help companies and other organizations understand what threats their networks can face and how best to mitigate them. For example, penetration t…
Background Gophish is a powerful, easy-to-use, open-source phishing toolkit meant to help pentesters and businesses conduct real-world phishing simulations. Gophish is a phishing framework that makes …
Introduction Developing and testing software in secure environments is a challenge, even for the most seasoned developers and testers. For example, government agencies often have strict rules around t…
In our ongoing series on the NIST Cybersecurity Framework, we have previously covered the identify and protect functions. In this article, we will delve deeper into the detect function, which is an essential component of any comprehensive c…