Katie HorneinShiftLeft BlogIncreasing your AppSec velocity with ShiftLeftAs the velocity of the software development lifecycle (SDLC) increases, so should the velocity of everything that gets integrated into the…Feb 3, 2022Feb 3, 2022
Katie HorneinShiftLeft BlogThree quick takes regarding the 2021 updates to the OWASP Top 10 listIn this article, we’ll take a look back at the changes to the OWASP Top 10 this past year.Dec 28, 2021Dec 28, 2021
Katie HorneinShiftLeft BlogWhat to do about CWEs in your applicationOver the past few weeks, we’ve published a series of blogs related to CWEs: we’ve taken a look at the changes in the Top 25 Most Dangerous…Oct 28, 2021Oct 28, 2021
Katie HorneinShiftLeft BlogCWE-77Improper Neutralization of Special Elements used in a Command (‘Command Injection’)Oct 21, 2021Oct 21, 2021
Katie HorneinShiftLeft BlogCWE-200Exposure of Sensitive Information to an Unauthorized ActorOct 4, 2021Oct 4, 2021
Katie HorneinShiftLeft BlogCWE-89CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)Sep 27, 2021Sep 27, 2021
Katie HorneinShiftLeft BlogCWE-78Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)Sep 23, 2021Sep 23, 2021
Katie HorneinShiftLeft BlogShiftLeft CORE on AWS MarketplaceWe are pleased to announce that ShiftLeft CORE is now available on the AWS Marketplace! Now, AWS users looking to integrate a complete…Sep 21, 2021Sep 21, 2021
Katie HorneinShiftLeft BlogCWE-611Improper Restriction of XML External Entity ReferenceSep 15, 2021Sep 15, 2021