Aug. 18, 2022, 6:48 p.m. | David Archer

Security Boulevard securityboulevard.com




Welcome to the second part of this series examining some of the myths that I’ve heard in many conversations around Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) while working at Contrast. Over the past four years, I have had the pleasure of discussing RASP with both open-minded individuals and Web Application Firewall (WAF) traditionalists and found that both groups often make incorrect assumptions and assertions about how RASP works. Let’s drill into some of those common myths. …

application application security appsec iast myths protection rasp runtime runtime application self-protection technology

Senior Security Officer

@ eSimplicity | Remote

Senior - Automated Cyber Attack Engineer

@ Deloitte | Madrid, España

Public Key Infrastructure (PKI) Senior Engineer

@ Sherwin-Williams | Cleveland, OH, United States

Consultant, Technology Consulting, Cyber Security - Privacy (Senior) (Multiple Positions) (1502793)

@ EY | Chicago, IL, US, 60606

Principal Associate, CSOC Analyst

@ Capital One | McLean, VA

Real Estate Portfolio & Corporate Security Lead

@ Lilium | Munich