Red Hat Consulting GitLab breach raises concerns over customer data exposure
Protecting financial web applications: Why centralized vulnerability management is critical
DAST and SCA: The AppSec power duo you might be underestimating
Strengthening enterprise application security: Invicti acquires Kondukto
Top 10 container scanning tools for 2025: Secure your containers and the apps they power
DAST for legacy web applications: Securing what still matters
Application security controls: Building applications that are secure by design
How to read and interpret a DAST report: From scan to secure code
How much does penetration testing cost in 2025?