Articles by Tag #sast

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

DevSecOps Fundamentals: Security in the Jenkins Pipeline

In today’s rapidly evolving software development landscape, speed is crucial. However, speed without...

Learn More 7 0Oct 6 '24

🐍 Secure Your Python Code in Minutes Using Bandit (A Practical Guide)

In today’s fast-paced software world, security isn’t something you can afford to overlook. The...

Learn More 2 0Apr 21

Uncovering SAST ,DAST ,OWASP Dependency-Check in DevSecOps family (Part-2)

In the first part I uncovered the fundamentals of DevSecOps principles and demonstrates with a...

Learn More 2 1Oct 17 '24

Herramientas SSDLC: SAST, DAST y SCA

El Ciclo de Vida de Desarrollo Seguro de Software (SSDLC) representa un conjunto de actividades...

Learn More 1 0May 28 '24

Is AI SAST a meme?

The security industry loves its buzzwords, and "AI-powered SAST" might seem like the latest marketing...

Learn More 1 0Apr 10

Launching Aikido for Cursor AI

Can you trust Gen AI Code? Developers can integrate security directly into their AI Code editor with Aikido for Cursor AI. Secure your code as its generated.

Learn More 0 0Dec 2 '24

SQL Injection: the vulnerability that refuses to die

In an era where we're building quantum computers and advancing AI at breakneck speed, one of the...

Learn More 0 0Jan 7

🔐 Securing Terraform with Checkov: Automating SAST for Infrastructure as Code

🧠 Summary This article walks you through how to apply Static Application Security Testing...

Learn More 0 0Apr 21

Launching Opengrep | Why we forked Semgrep

Meet Opengrep, the open-source security engine for developers– a fork of Semgrep. Launched by 10 rival security companies uniting behind the future of open source security.

Learn More 0 0Jan 23

Static Application Security Testing (SAST): Finding Vulnerabilities Early in the Development Process

Static Application Security Testing (SAST) is a vital component of modern software development,...

Learn More 0 0Oct 10 '24

🥋 Applying Aikido: SAST in Web Applications from the Repository

🧠 Summary In this article, you’ll learn what SAST is and why it’s crucial to incorporate...

Learn More 0 0Apr 21

Path Traversal in 2024 - The year unpacked

Path traversal, also known as directory traversal, occurs when a malicious user manipulates...

Learn More 0 0Nov 24 '24

Why Current Methods Fail to Measure Real Vulnerability Risks?

In today's dynamic digital landscape, safeguarding data and infrastructure requires not just...

Learn More 0 0Feb 6

Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Static analysis tools are indispensable for modern software security, but integrating them seamlessly...

Learn More 0 0Mar 22