Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

Acunetix Web Security Blog

Articles, news, and events from leading web security experts.

WEB SECURITY ZONE FAQS & DOCUMENTATION NEWS RELEASES EVENT WHITEPAPERS CASE STUDIES

Threat modeling for web application security

Web Security Zone | June 13, 2022 by Tomasz Andrzej Nidecki

Threat modeling is an activity that helps you identify and mitigate threats. It’s very important because it makes you look at security risks top-down, focus on decision-making and prioritize cybersecurity decisions, and consider how you can use your resources in the best possible way. There…

Read more

Considerations for web application remediation testing

Web Security Zone | June 6, 2022 by Kevin Beaver

It seems that most application security discussions revolve around initial vulnerability scanning and penetration testing. You’ve got to start somewhere. The thing is many people often stop at that point. Vulnerabilities are uncovered, results are passed along to developers, DevSecOps, or other technical staff, and…

Read more

Penetration testing vs vulnerability scanning

Web Security Zone | May 30, 2022 by Tomasz Andrzej Nidecki

Businesses often perceive vulnerability scanning as an alternative to penetration testing. This perception is wrong. An organization conscious of cybersecurity must include both these activities in their business processes and make sure that they work in unison. Missing out on one of them greatly decreases…

Read more

Acunetix releases IAST support for JBoss, Jetty and WildFly Java servers as well as Servlet 3 and Jersey Java frameworks

Product Releases | May 24, 2022 by Nicholas Sciberras

A new Acunetix Premium update has been released for Windows, Linux, and macOS: 14.8.220519149. This Acunetix release introduces support for JBoss, Jetty and WildFly, allowing the Java IAST sensor (AcuSensor) to be used with these Java servers. In addition, the Java IAST sensor has been…

Read more

What is DevSecOps and how should it work?

Web Security Zone | May 23, 2022 by Tomasz Andrzej Nidecki

DevSecOps stands for development, security, and operations. Similar to DevOps or SecOps, it is a concept that joins two previously separate roles into a unified environment. DevSecOps teams are responsible for providing conditions for continuous secure software development. Being a newer concept than DevOps, DevSecOps…

Read more

Four ways to combat the cybersecurity skills gap

Web Security Zone | May 16, 2022 by Tomasz Andrzej Nidecki

The lack of cybersecurity talent is nothing new. It’s a problem that all businesses have been facing for several years and it’s getting worse. There have been many proposals on how to narrow the gap, but so far all efforts have been futile. Let’s have…

Read more

Four ways AppSec analytics help your DevSecOps pros work smarter, not harder

Web Security Zone | May 9, 2022 by Meaghan McBee

What’s in a number? For DevSecOps professionals, the answer is “a lot.” Analytics in application security (AppSec) hold immense power, helping teams decide where to focus their priorities and pick up on patterns that uncover knowledge gaps. Reporting with clear analytics helps set standards for…

Read more

Acunetix by Invicti exhibiting at RSA Conference 2022

Events | May 3, 2022 by Saran Toure

We’re thrilled to once again be exhibiting at the RSA Conference from June 6-9 in San Francisco. This event is undoubtedly one of the largest in the industry, convening thousands of innovators in cybersecurity from around the world to share perspectives that spark new ideas. This year’s…

Read more

How to build a cyber incident response plan

Web Security Zone | April 25, 2022 by Tomasz Andrzej Nidecki

No matter how well you manage your security posture, there is always a chance that you will become a victim of a cyber attack. That is why every organization, no matter the size, should be prepared to react to a cyber incident. The key element…

Read more

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 139
  • 4 / 139
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti