Welcome to the first episode of The Elephant in AppSec, the podcast to explore, challenge, and boldly face the AppSec Elephants in the room.| Escape DAST - Application Security Blog
Learn to detect/avoid vulnerable dependencies in app development with Software Composition Analysis (SCA) using a voluntary vulnerable Python app| Escape - The API Security Blog
Learn about the shift-left approach in cybersecurity and how it integrates security practices into the early stages of software development.| Escape - The API Security Blog
Learn why security engineers need a new approach to identify business logic flaws.| Escape DAST - Application Security Blog
Explore the differences between SAST and DAST and how to combine the two for effective application security testing.| Escape - The API Security Blog