What’s in a number? For DevSecOps professionals, the answer is “a lot.” Analytics in application security (AppSec) hold immense power, helping teams decide where to focus their priorities and pick up on patterns that uncover knowledge gaps. Reporting with clear analytics helps set standards for…
Acunetix by Invicti exhibiting at RSA Conference 2022
We’re thrilled to once again be exhibiting at the RSA Conference from June 6-9 in San Francisco. This event is undoubtedly one of the largest in the industry, convening thousands of innovators in cybersecurity from around the world to share perspectives that spark new ideas. This year’s…
How to build a cyber incident response plan
No matter how well you manage your security posture, there is always a chance that you will become a victim of a cyber attack. That is why every organization, no matter the size, should be prepared to react to a cyber incident. The key element…
Invicti Named a Challenger in the 2022 Gartner® Magic Quadrant™ for Application Security Testing
Invicti believes position reflects the company’s commitment to delivering continuous modern AppSec at scale AUSTIN, TX – April 21, 2022 – Invicti Security™ today announced the company has been named a Challenger in the 2022 Gartner Magic Quadrant for Application Security Testing. This is Invicti’s…
Where cybersecurity frameworks meet web security
A cybersecurity framework is a set of guidelines for business environments to manage security effectively. Cybersecurity frameworks are adaptive and usually cover multiple aspects of cybersecurity programs, including security controls, appropriate safeguards and mitigation, appropriate activities, risk management programs, protective technology, continuous monitoring, as well…
DevSecOps: How to get there from DevOps
DevSecOps is a practice that merges the work done by development (Dev), security (Sec), and IT operations teams (Ops) to deliver the most efficient and effective software development practices. But why is it still so rare? Let us take a look at the difficulties of…
Invicti’s Spring 2022 AppSec Indicator highlights unrelenting direct-impact flaws
The spring 2022 edition of the Invicti AppSec Indicator has arrived hot off the presses, and it underscores some alarming trends for severe web vulnerabilities. The data shows that direct-impact flaws are still showing up in customer scan results at alarming rates. Worse still, these…
Critical alert – Spring4Shell RCE (CVE-2022-22965 in Spring)
On March 31, 2022, a serious zero-day vulnerability was discovered in the Spring framework core, which is an open-source framework for building enterprise Java applications. The vulnerability, dubbed Spring4Shell (similar to Log4Shell) or Springshell, was identified as CVE-2022-22965 (at the time of writing, not yet…
7 web application security best practices
To maintain the best possible security posture and protect your sensitive data against cyberattacks, you cannot just rely on security products alone. Here is a list of seven key elements that we believe should be considered in your web app security strategy. 1. Include everyone in security…