Implementing a Shift-Left Approach Shift left is a concept that has been gaining traction in the cybersecurity industry in recent years, with the focus on...
Application programming interfaces, usually just referred to as APIs, are a very common attack vector when enterprises are breached. A poorly written and secured API...
Hello and welcome to PM Corner! I’m Lindsy Farina, Senior Product Manager here at StackHawk! Today I will be sharing a little about the themes...
In today’s fast-paced digital landscape, meeting compliance requirements has become increasingly crucial for most organizations. This is especially true when operating in highly regulated industries...
Introducing StackHawk’s new Optimization Tips Panel First of all, welcome back to the PM corner, I’m Lindsy Farina, senior PM here at StackHawk! If you...
The pace of AI-based technologies is growing faster than any technology we’ve yet to see. It has sparked curiosity into the elements of how AI...
Authentication is a critical aspect of software development, ensuring that only authorized users can access sensitive information or perform specific actions. While traditional username and...
BlackHat 2023 has come to an end, and it was an exciting experience for the StackHawk team. My colleagues Austin, Zach, and I had the...
Tired of being the last to know when new code is deployed and routes are added to your attack surface? Meet GitHub Insights, your one-stop-shop...
StackHawk and Snyk first teamed up to build a best-in-class Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) integration. This technical integration...
StackHawk and GitHub work together to help developers find and fix security vulnerabilities in their normal workflows and give security teams full visibility into their...
In a time where API security is paramount, the adoption of gRPC (gRPC Remote Procedure Calls) is on the rise, offering advantages like performance gains...