As part of the RSA Conference 2021, Mark Ralls, Invicti® President & COO, was interviewed by Security Weekly’s Matt Alderman on the topic of the findings included in the Invicti AppSec Indicator Spring 2021 Edition: Acunetix® Web Vulnerability Report – the lost year in web…
The effect of President Biden’s security order on web application vendors
Do you want to sell your web applications to US government agencies? We have bad news and good news. The bad news is: President Biden just made it more difficult for you. The good news is: Acunetix® can make it much easier. The SolarWinds breach…
Invicti recognized on the 2021 Gartner Magic Quadrant for Application Security Testing
At Invicti, we are absolutely thrilled to be recognized for the first time in the Magic Quadrant for Application Security Testing this year. Gartner is a leading IT research and advisory firm that helps businesses of all sizes evaluate technology and make informed decisions. We…
Invicti Security Is Named in 2021 Gartner Magic Quadrant for Application Security Testing
Company recognized for completeness of vision and ability to execute AUSTIN, TEXAS – June 1st, 2021 – Invicti Security™, a global innovator in web application security, today announced that it has been recognized for the first time in the Gartner Magic Quadrant for Application Security Testing with…
Why most application security measures fail and what must be done about it
In business, you’re only as good as the things that you have control over. And the only things that you can have control over are the things that you proactively measure and manage. If application security is an important part of your overall security program…
How to avoid web supply chain attacks
In early 2021, attackers infiltrated SolarWinds software used by thousands of major businesses and organizations worldwide. This allowed malicious parties to access data owned by not just SolarWinds but everyone who used the SolarWinds solution. Such attacks are called supply chain attacks and yes, they…
Integrating Acunetix with CircleCI
If you want to include Acunetix in your DevSecOps, you need to integrate it with a CI/CD system. Acunetix has an out-of-the box integration for the most popular CI/CD system – Jenkins. However, you can use the Acunetix REST API to integrate the scanner with…
Sensitive data exposure – how breaches happen
The term sensitive data exposure means letting unauthorized parties access stored or transmitted sensitive information such as credit card numbers or passwords. Most major security breaches worldwide result in some kind of sensitive data exposure. Exploiting an attack vector such as a web vulnerability is…
Ad-hoc scanning is not enough
A web vulnerability scanner is usually perceived as an ad-hoc tool. Initially, all vulnerability scanners were such tools and current open-source web application security solutions still follow that model. However, with a major increase in the complexity and availability of web technologies, the ad-hoc model…