CARVIEW |
Select Language
HTTP/2 200
x-vhost: blackduck
content-security-policy: default-src 'self' 'unsafe-hashes' 'unsafe-inline' 'unsafe-eval' data: blob: edge.adobedc.net adobedc.demdex.net *.adobe.com *.adobe.io cdn.cookielaw.org assets.adobedtm.com kit.fontawesome.com ka-p.fontawesome.com munchkin.marketo.net adobedc.demdex.net snap.licdn.com *.drift.com js.driftt.com js.zi-scripts.com j.6sc.co geolocation.onetrust.com ipv6.6sc.co c.6sc.co b.6sc.co epsilon.6sense.com px.ads.linkedin.com static.cloud.coveo.com boards.greenhouse.io *.mktoresp.com ws.zoominfo.com job-boards.greenhouse.io api.company-target.com *.org.coveo.com synopsysnonproduction2yln023as.analytics.org.coveo.com *.brighttalk.com brighttalk.com js.zi-scripts.com *.blackduck.com blackduck.com players.brightcove.net *.brightcove.com manifest.prod.boltdns.net *.brightcovecdn.com googletagmanager.com *.googletagmanager.com *.google.com *.google.ca *.google.co.uk google.co.in google.com *.google-analytics.com google-analytics.com googleads.g.doubleclick.net td.doubleclick.net *.googleapis.com *.gstatic.com *.leadspace.com *.clarity.ms *.bing.com *.bing.net *.bing-int.com *.6sc.co *.6sense.co 846-esg-342.mktoutil.com *.youtube.com;
cache-control: max-age=300
expires: Fri, 10 Oct 2025 18:56:00 GMT
content-encoding: gzip
x-frame-options: SAMEORIGIN
content-type: text/html;charset=utf-8
x-content-type-options: nosniff
accept-ranges: bytes
age: 0
date: Fri, 10 Oct 2025 18:51:02 GMT
strict-transport-security: max-age=31557600
set-cookie: affinity="228f0245914b5283"; Path=/; HttpOnly; secure
x-served-by: cache-bom-vanm7210027-BOM
x-cache: MISS
x-timer: S1760122260.945214,VS0,VS0,VE2150
vary: Accept-Encoding,User-Agent
content-length: 13977
Web AppSec | Black Duck Blog
Web AppSec
Web applications, like software, inevitably contain defects that can be exploited by hackers. Read articles on web application security and secure development practices to learn more about implementing security measures throughout the software development life cycle.
Last Published
50
Stories
16
Writers
SAST vs. DAST: What’s the best method for application security testing?
Mar 18, 2024
|
3 min read
Two-factor authentication misconfiguration bypass
May 12, 2022
|
3 min read
Top 10 Spring Security best practices for Java developers
Oct 16, 2021
|
7 min read
Web application security testing at scale with Coverity SAST
Jun 05, 2021
|
3 min read
What are the different types of security vulnerabilities?
Aug 26, 2019
|
3 min read
The license and security risks of using Node.js
Aug 11, 2019
|
6 min read
Why hackers are targeting your web apps (and how to stop them)
Jul 14, 2019
|
4 min read
Web AppSec interview questions every company should ask
Jun 18, 2019
|
7 min read
How are code quality and code security related?
May 24, 2019
|
3 min read
Bug bounties: A good tool, but don’t make them the only tool in security
Mar 13, 2019
|
5 min read
How RASP complements application security testing to minimize risk
Jul 14, 2018
|
2 min read
The what, why, and who of runtime application self-protection (RASP)
Jun 14, 2018
|
3 min read
Node.js: Preventing common vulnerabilities in the MEAN stack
May 16, 2017
|
2 min read
AngularJS: Preventing common vulnerabilities in the MEAN stack
May 08, 2017
|
5 min read
ExpressJS: Preventing common vulnerabilities in the MEAN stack (Part 1)
Apr 20, 2017
|
2 min read
MongoDB: Preventing common vulnerabilities in the MEAN stack
Apr 13, 2017
|
5 min read
Attributes of secure web application architecture
Apr 04, 2017
|
7 min read
Forging a SHA-1 MAC using a length-extension attack in Python
Mar 22, 2017
|
4 min read
AngularJS security series part 1: Angular $http service
Feb 23, 2017
|
11 min read
The Complete Security Vulnerability Assessment Checklist
Sep 07, 2016
|
2 min read
Avoiding false positives in application security through customization
Aug 08, 2016
|
3 min read
Web application security threats and countermeasures
Jul 18, 2016
|
2 min read
Man in the middle: When Bob met Alice, and Eve heard everything
Apr 28, 2016
|
3 min read
The complete web application security testing checklist
Apr 25, 2016
|
3 min read
Application security vs. software security: What’s the difference?
Apr 12, 2016
|
6 min read
When and how to support static analysis tools with manual code review
Jan 27, 2016
|
5 min read
Pen testing best practices to take the pain out of penetration testing
Jan 18, 2016
|
4 min read
Serving resources over SSL with CSP upgrade-insecure-requests
Aug 06, 2015
|
1 min read
4 application security skills every expert ought to have
Jun 18, 2015
|
2 min read
Is conventional penetration testing enough to secure e-commerce applications?
Mar 30, 2015
|
3 min read
Last Published