Category: Software, Business, Security, Data, automation

May’s Colonial Pipeline ransomware attack brought to light — maybe more than ever before — just how much disruption an attack of this kind could wreak on the country.

The National Institute of Standards and Technology (NIST) quickly followed with a memo defining the critical software that must be defended from attack. NIST defines this critical software as any that is able to run with elevated privileges or that controls access to data or operation technology.

Web apps represent a massive attack surface and are one of the dominant attack vectors for hackers.

Modern dynamic application security testing (DAST) and interactive application security testing (IAST) are two examples of solutions that can bring critical time-savings (often the difference between hours and days) and accuracy to security teams.

Related Articles