Probely introduces updated grading criteria for new security headers.

Choosing DAST Tools for DevSecOps: A Guide

When it comes to web application security testing tools, there are different options available depending on what and how you are testing. However, for a comprehensive assessment of your running applications’ security status, dynamic application security testing (DAST) is highly recommended. DAST is designed to test websites and applications by simulating real attacks and identifying […]

The Ongoing Presence of Prompt Injections

Some days, it feels like every application and system out there is getting new functionality based on large language models (LLMs). As chatbots and other AI assistants get more and more access to data and software, it’s vital to understand the security risks involved—and prompt injections are considered the number one LLM threat. In his […]

HHS Introduces Crucial New Strategies for Enhancing Cybersecurity in Healthcare

In early December 2023, the U.S. Department of Health and Human Services published a concept paper outlining imperative new guidelines for healthcare organizations tackling cybersecurity. The publication comes on the tailwind of the Biden-Harris administration’s National Cybersecurity Strategy, building off of that momentum with a renewed focus on one of the nation’s most high-risk sectors. […]

Is the Vulnerability Truly Resolved?

It’s tempting to speak about security in binary terms: fixed or not fixed, patched or unpatched, secure or insecure. Reality, though, is more about shades of gray and probabilities than absolutes. It’s also about limited resources and endless prioritization—always with the awareness that the stakes are high and any security gaps you fail to address […]

The Negative Impact of Security Tool Sprawl on Application Security Testing: 3 Ways It Hurts

Tool sprawl is a problem in all walks of the technology industry but can hit especially hard in cybersecurity. Losing track of the security toolset in your organization introduces inefficiencies that can hurt not only your security operations and incident response but also your application development and overall company performance. There are many examples of […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.