When applications use a microservices architecture, it’s possible for clients and microservices to communicate directly. However, this operation is suitable for a restricted functional domain...
Whether we like it or not, cybersecurity is a rapidly evolving arena. It’s just a matter of time before your business or organization falls victim...
The hottest topic in the API realm these days seems to be API security. Looking at the OWASP API Top Ten, it’s easy to see...
HawkScan provides the information and tools you need to fix security vulnerabilities in your applications. But how do you know if you’ve fixed a vulnerability...
Why is this new feature important? The parameters defined in a GraphQL API are meant to represent real data, in other words, actual usernames, asset...
APIs are the new frontier of security. The bulk of web traffic is now going to and from APIs. Of course, some APIs are built...
StackHawk has recently made a few improvements to our Jira Cloud Integration. Atlassian Jira is the premier software planning and project tracking software. The StackHawk...
SAST vs. DAST: Which to Choose? In the world of application security testing, two types of testing reign supreme: DAST and SAST. Both toolings offer...
When HawkScan scans an application, it uses a scan policy to determine which vulnerability tests to run against that app. Scan policies are a collection...
Anyone who is working in a highly-regulated industry or is a SaaS provider has likely heard about SOC 2 compliance. SOC 2 certification has become...
The importance of security in web applications can’t be understated. In today’s digital age, web applications play a central role in our personal and professional...
On this Valentine’s day, make sure to pop open a bottle of champagne and drink it with the one you love. And by the one...