security testing
![magnify](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094422/magnify-inspect1-400x200.jpg)
The importance of implementing security scanning in the software development lifecycle
Veracode published a research that finds most applications are now scanned around three times a week, compared to just two or three times a year a decade ago. This represents …
![programming](https://img.helpnetsecurity.com/wp-content/uploads/2018/12/09095527/programming-400x200.jpg)
Low code applications are essential for cybersecurity development in applications
One of the biggest changes to the cybersecurity landscape is that developers are now often expected to implement security directly into the applications they’re building as …
![Oxeye](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/02094501/oxeye-1200-400x200.jpg)
Product showcase: Oxeye.io – Cloud native application security testing
Delivering secure applications requires tooling built for automation in the modern tech stack. Oxeye provides a cloud-native application security testing solution that is …
![mobile security](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/18175826/mobile_security-device-400x200.jpg)
A 2022 priority: Automated mobile application security testing
The use of mobile devices has skyrocketed in the past two years and with it the mobile app market. It’s predicted mobile apps will generate more than $935 billion in revenue …
![application](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27101818/application-blue-400x200.jpg)
The threats of modern application architecture are closer than they appear
Modern applications and software have evolved as the transition to the cloud was accelerated by widespread digital transformation, as enterprises of all sizes made heavy …
![cube](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103500/cube-400x200.jpg)
Regulation fatigue: A challenge to shift processes left
Recent high-profile supply chain attacks have heightened the need for increased regulation of the open-source community. In the U.S., for example, President Biden’s …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103509/IoT-400x200.jpg)
ETSI completes set of IoT MQTT and CoAP testing standards
The ETSI committee on Methods for Testing and Specifications (TC MTS) has recently completed a first set of seven standards addressing the testing of the IoT MQTT and CoAP …
![firefighters](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111014/firefighters-400x200.jpg)
Most disaster recovery solutions are not tested on a regular basis
As organizations work diligently to support evolving business needs, while at the same time battling cybercrime and other threats to critical data, the majority of disaster …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093701/power-utilities-400x200.jpg)
Top security threats for power plants and how to proactively avoid them
Power plants are one of the most vitally important components of modern civilization’s infrastructure. A disruption in energy production impacts all aspects of society from …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094216/brain-400x200.jpg)
Counterfit: Open-source tool for testing the security of AI systems
After developing a tool for testing the security of its own AI systems and assessing them for vulnerabilities, Microsoft has decided to open-source it to help organizations …
![mind map](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/30163653/mind_map-400x200.jpg)
MindAPI makes API security research and testing easier
Security researcher David Sopas has published a new open-source project: MindAPI, a mind map with resources for making API security research easier. “I love mind maps. …
![Pentest Robots](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19071406/pentest_robots_gui2-400x200.jpg)
Product showcase: Pentest Robots
Security testing automation is not about building tech to replace humans. We don’t adhere to that limiting view because it fails to capture the complexity and depth of …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD