{"payload":{"contentfulRawJsonResponse":{"sys":{"type":"Array"},"total":11,"skip":0,"limit":1000,"items":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2aVRXEdIZaSn9mafEMxmbB","type":"Entry","createdAt":"2024-07-11T16:47:51.742Z","updatedAt":"2024-07-11T16:47:51.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is security testing?","path":"/resources/articles/security/what-is-security-testing","template":{"sys":{"type":"Link","linkType":"Entry","id":"6W8M3TkBdb4YSgiP1l5PSy"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"1NYfjJ5lexeaA2zXNqI8qb"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"2l4n7DkukRcFFBePgpPEVS"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4Qe0uOEMbW9ZUYounYcY7M","type":"Entry","createdAt":"2024-07-11T15:41:55.267Z","updatedAt":"2024-07-11T15:41:55.267Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is vulnerability scanning?","path":"/resources/articles/security/what-is-vulnerability-scanning","template":{"sys":{"type":"Link","linkType":"Entry","id":"2R2zyu2vx2gQSmEHZyZ2dy"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"17Cv0mCD8sTuIQBifhEG7V"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"1ZI36wEk0jwwc1NqSMvWZE"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2AuwH9US7ECUONY6bShBz6","type":"Entry","createdAt":"2024-07-11T14:41:35.212Z","updatedAt":"2024-07-11T14:41:35.212Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is threat modeling?","path":"/resources/articles/security/what-is-threat-modeling","template":{"sys":{"type":"Link","linkType":"Entry","id":"8cpgkmneHHbdV2eAlVkgh"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"2VuQ7ix1PRrVJULOYCjNJt"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"2CNrE17sj5fsYvZ0NfKusl"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1aPqB6Is4fCxlilIBwZx0U","type":"Entry","createdAt":"2024-07-11T14:24:08.164Z","updatedAt":"2024-07-11T14:24:08.164Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is fuzzing and fuzz testing?","path":"/resources/articles/security/what-is-fuzz-testing","template":{"sys":{"type":"Link","linkType":"Entry","id":"kZnxKnOXoK3K4Zd9Es6uV"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"1TRZdvwNA35bOsXUKiBtFv"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"1V62uS85rTb9fjwJvgorov"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6sYLiTesammFoNXGzDuAGG","type":"Entry","createdAt":"2024-07-10T18:33:57.176Z","updatedAt":"2024-07-10T18:33:57.176Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is runtime application self-protection (RASP)?","path":"/resources/articles/security/what-is-rasp","template":{"sys":{"type":"Link","linkType":"Entry","id":"sqKS1UivZKfbmBaOUw44F"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"4lR3xF9SZzBGNNqmCOzKV6"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"450gwHLlMfblW33FIj8RuC"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3K3C5SXFML9JQZTC0fhBBT","type":"Entry","createdAt":"2024-07-10T17:57:52.273Z","updatedAt":"2024-07-10T17:58:10.976Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Mobile application security","path":"/resources/articles/security/mobile-application-security","template":{"sys":{"type":"Link","linkType":"Entry","id":"7Brud44tR7OqXK3GP1kC6a"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"3IVq7QMJxiEUmCydUQsEsZ"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"6gi21okIffGqOIGuMAdxkb"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2y2D9HlWG7aENxl4QBNnEd","type":"Entry","createdAt":"2024-07-10T15:49:54.776Z","updatedAt":"2024-07-10T17:47:45.237Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is SAST?","path":"/resources/articles/security/what-is-sast","template":{"sys":{"type":"Link","linkType":"Entry","id":"1XqtshwYwAcQXCpO3lQ4bB"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"6SDWk6OvCCwqNgrn1Eb0TK"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"7E4fqsqlOJbznmAkGQF2iI"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"wndfd3LteQ1gBcXcRZk9Z","type":"Entry","createdAt":"2024-07-10T17:44:19.519Z","updatedAt":"2024-07-10T17:45:04.557Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Application security posture management (ASPM)","path":"/resources/articles/security/application-security-posture-management","template":{"sys":{"type":"Link","linkType":"Entry","id":"5LADAn7FwwSl2NrJnb9gw1"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"5OsbamVzZLhgvdowVwFX9o"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"7btbAw95LMPHwQ134JxhKr"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"BK3uBqJYJSdMn1dGkkXTy","type":"Entry","createdAt":"2024-06-25T02:11:56.726Z","updatedAt":"2024-07-08T13:08:58.810Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is application security and how does it work?","path":"/resources/articles/security/what-is-application-security","template":{"sys":{"type":"Link","linkType":"Entry","id":"49CZLUcrGvFOPyLYAvuMn2"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"31o7Q9zI7l4Mj1TraoDcW7"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"5u1t1Wv9TGVYwuTFWnwDOo"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7gP64xn3vkY2cRhZyWN128","type":"Entry","createdAt":"2024-06-25T02:17:11.242Z","updatedAt":"2024-06-25T02:17:11.242Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Application security testing","path":"/resources/articles/security/application-security-testing","template":{"sys":{"type":"Link","linkType":"Entry","id":"t6V7QaZcvTk0W10BEh56e"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"10JlCKLpbXP6tHBcK5nuy1"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"197IauMaeNEO5TLJjBRETp"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4O0twTc06gQW2RNrFzkKZh","type":"Entry","createdAt":"2024-06-24T18:11:33.841Z","updatedAt":"2024-06-24T18:11:33.841Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Dynamic application security testing (DAST)","path":"/resources/articles/security/what-is-dast","template":{"sys":{"type":"Link","linkType":"Entry","id":"5MoYAecD2ZqO8SKeyGKo93"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"5eAggjDO1i1hGw98hVBxpc"}}}}],"includes":{"Entry":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"10JlCKLpbXP6tHBcK5nuy1","type":"Entry","createdAt":"2024-06-25T02:17:11.546Z","updatedAt":"2024-06-25T02:17:11.546Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-testing","featureFlag":"contentful_lp_seo_pages","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"12PvPAvYTL5rc0ZCE0Diif","type":"Entry","createdAt":"2024-06-25T02:31:15.515Z","updatedAt":"2024-06-25T02:31:15.515Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Dark 2","image":{"sys":{"type":"Link","linkType":"Asset","id":"6iqN6327Tz9zouhZu7Ow74"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"17Cv0mCD8sTuIQBifhEG7V","type":"Entry","createdAt":"2024-07-11T15:41:56.317Z","updatedAt":"2024-07-17T13:47:33.206Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-vulnerability-scanning","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"197IauMaeNEO5TLJjBRETp","type":"Entry","createdAt":"2024-06-25T02:17:11.564Z","updatedAt":"2024-06-25T02:17:11.564Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-testing SEO","description":"Discover the importance of application security testing (AST) to ensure the security of your applications. Learn about common types of attacks and vulnerabilities, the role of security testing tools, and best practices for implementing AST in your organization."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1NYfjJ5lexeaA2zXNqI8qb","type":"Entry","createdAt":"2024-07-11T16:47:52.453Z","updatedAt":"2024-07-17T13:48:16.205Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-security-testing","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1TRZdvwNA35bOsXUKiBtFv","type":"Entry","createdAt":"2024-07-11T14:24:08.938Z","updatedAt":"2024-07-17T13:45:38.243Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-fuzz-testing","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1V62uS85rTb9fjwJvgorov","type":"Entry","createdAt":"2024-07-11T14:24:09.138Z","updatedAt":"2024-07-11T14:24:09.138Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-fuzz-testing","description":"Discover vulnerabilities and enhance software security with fuzzing. Learn techniques, tools, and best practices for fuzz testing in software development."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1XqtshwYwAcQXCpO3lQ4bB","type":"Entry","createdAt":"2024-07-10T15:49:54.926Z","updatedAt":"2024-07-10T15:51:15.679Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is SAST?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover benefits, scanning tools, & best practices of Static Application Security Testing (SAST) to enhance code security and mitigate vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"5jk9xlzqocl157dfwxzbrV"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1ZI36wEk0jwwc1NqSMvWZE","type":"Entry","createdAt":"2024-07-11T15:41:56.335Z","updatedAt":"2024-07-11T15:41:56.335Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-vulnerability-scanning","description":"Discover the importance of vulnerability scanning in software development. Learn about vulnerability assessment, analysis, mitigation, and scanning tools."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2CNrE17sj5fsYvZ0NfKusl","type":"Entry","createdAt":"2024-07-11T14:41:36.299Z","updatedAt":"2024-07-11T14:41:36.299Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-threat-modeling","description":"Threat modeling is a structured process that identifies security threats across systems during the design and planning phases of software production."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2R2zyu2vx2gQSmEHZyZ2dy","type":"Entry","createdAt":"2024-07-11T15:41:55.375Z","updatedAt":"2024-07-11T15:41:55.375Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is vulnerability scanning?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover the importance of vulnerability scanning in software development. Learn about vulnerability assessment, analysis, mitigation, and scanning tools.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"3xH3Mi0Vz2ithc5TGSe1Jg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2VuQ7ix1PRrVJULOYCjNJt","type":"Entry","createdAt":"2024-07-11T14:41:36.282Z","updatedAt":"2024-07-17T13:46:55.491Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-threat-modeling","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2l4n7DkukRcFFBePgpPEVS","type":"Entry","createdAt":"2024-07-11T16:47:52.538Z","updatedAt":"2024-07-11T16:47:52.538Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-security-testing","description":"Learn about security testing with our guide to security testing types, tools, and scanning methods, and best practices and trends for greater software security."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"31o7Q9zI7l4Mj1TraoDcW7","type":"Entry","createdAt":"2024-06-25T02:11:57.428Z","updatedAt":"2024-06-25T02:11:57.428Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-application-security","featureFlag":"contentful_lp_seo_pages","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3IVq7QMJxiEUmCydUQsEsZ","type":"Entry","createdAt":"2024-07-10T17:57:53.321Z","updatedAt":"2024-07-17T13:44:17.627Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/mobile-application-security","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3xH3Mi0Vz2ithc5TGSe1Jg","type":"Entry","createdAt":"2024-06-24T18:11:33.957Z","updatedAt":"2024-06-24T18:11:33.957Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Dark 1","image":{"sys":{"type":"Link","linkType":"Asset","id":"WNgDKEiygdGk22WgaD2TE"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"450gwHLlMfblW33FIj8RuC","type":"Entry","createdAt":"2024-07-10T18:33:57.637Z","updatedAt":"2024-07-10T18:33:57.637Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-rasp","description":"Learn how runtime application self-protection (RASP) protects software against attacks with real-time detection & prevention for application security."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"49CZLUcrGvFOPyLYAvuMn2","type":"Entry","createdAt":"2024-06-25T02:11:56.832Z","updatedAt":"2024-06-25T02:31:15.425Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is application security and how does it work?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Get an overview of what application security is and how it works, as well as best practices. Learn more about the importance of application security and how to safeguard your apps.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"12PvPAvYTL5rc0ZCE0Diif"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4lR3xF9SZzBGNNqmCOzKV6","type":"Entry","createdAt":"2024-07-10T18:33:57.570Z","updatedAt":"2024-07-17T13:43:44.029Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-rasp","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5GWzTcPVLUwf5QhQR1zX95","type":"Entry","createdAt":"2024-07-10T17:57:52.594Z","updatedAt":"2024-07-10T17:57:52.594Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Light 1","image":{"sys":{"type":"Link","linkType":"Asset","id":"7ETOYx5RKOqnELEHUOZDLa"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5LADAn7FwwSl2NrJnb9gw1","type":"Entry","createdAt":"2024-07-10T17:44:19.629Z","updatedAt":"2024-07-10T17:44:19.629Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Application security posture management (ASPM)","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn more about application security posture management for insights and explore best practices to increase protection against evolving cyber threats.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"3xH3Mi0Vz2ithc5TGSe1Jg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5MoYAecD2ZqO8SKeyGKo93","type":"Entry","createdAt":"2024-06-24T18:11:33.937Z","updatedAt":"2024-06-24T18:12:19.646Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Dynamic application security testing (DAST)","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"DAST is an AppSec method that simulates attacks to test web apps for security issues.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"3xH3Mi0Vz2ithc5TGSe1Jg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5OsbamVzZLhgvdowVwFX9o","type":"Entry","createdAt":"2024-07-10T17:44:20.145Z","updatedAt":"2024-07-17T13:44:53.592Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-posture-management","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5eAggjDO1i1hGw98hVBxpc","type":"Entry","createdAt":"2024-06-24T18:11:34.285Z","updatedAt":"2024-06-24T18:11:34.285Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-dast SEO","description":"DAST is an AppSec method that simulates attacks to test web apps for security issues."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5jk9xlzqocl157dfwxzbrV","type":"Entry","createdAt":"2024-06-25T02:11:56.853Z","updatedAt":"2024-06-25T02:30:50.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Light 3","image":{"sys":{"type":"Link","linkType":"Asset","id":"2xk9Ss2Xsd19aHioDXJvam"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5u1t1Wv9TGVYwuTFWnwDOo","type":"Entry","createdAt":"2024-07-08T13:08:56.160Z","updatedAt":"2024-07-08T13:08:56.160Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-application-security SEO","description":"Learn more about the importance of app security and how to safeguard your applications."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"69EibalzHbLKlAqlCdsWdn","type":"Entry","createdAt":"2024-07-11T14:41:35.534Z","updatedAt":"2024-07-11T14:41:35.534Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Light 3","image":{"sys":{"type":"Link","linkType":"Asset","id":"ZDIT3ae5vdcud13spe9RW"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6SDWk6OvCCwqNgrn1Eb0TK","type":"Entry","createdAt":"2024-07-10T15:49:55.395Z","updatedAt":"2024-07-17T13:39:51.741Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-sast","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6W8M3TkBdb4YSgiP1l5PSy","type":"Entry","createdAt":"2024-07-11T16:47:51.869Z","updatedAt":"2024-07-11T16:47:51.869Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is security testing?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn about security testing with our guide to security testing types, tools, and scanning methods, and best practices and trends for greater software security.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"69EibalzHbLKlAqlCdsWdn"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6gi21okIffGqOIGuMAdxkb","type":"Entry","createdAt":"2024-07-10T17:57:53.338Z","updatedAt":"2024-07-10T17:57:53.338Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/mobile-application-security","description":"Learn how mobile application security protects mobile apps from software vulnerabilities, cyberthreats, and data breaches."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7Brud44tR7OqXK3GP1kC6a","type":"Entry","createdAt":"2024-07-10T17:57:52.528Z","updatedAt":"2024-07-10T17:58:08.968Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Mobile application security","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn how mobile application security protects mobile apps from software vulnerabilities, cyberthreats, and data breaches.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"5GWzTcPVLUwf5QhQR1zX95"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7E4fqsqlOJbznmAkGQF2iI","type":"Entry","createdAt":"2024-07-10T15:49:55.409Z","updatedAt":"2024-07-10T15:49:55.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-sast"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7btbAw95LMPHwQ134JxhKr","type":"Entry","createdAt":"2024-07-10T17:44:20.161Z","updatedAt":"2024-07-10T17:44:20.161Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-posture-management ","description":"Learn more about application security posture management for insights and explore best practices to increase protection against evolving cyber threats."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"8cpgkmneHHbdV2eAlVkgh","type":"Entry","createdAt":"2024-07-11T14:41:35.361Z","updatedAt":"2024-07-11T14:41:35.361Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is threat modeling?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Threat modeling is a structured process that identifies security threats across systems during the design and planning phases of software production.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"69EibalzHbLKlAqlCdsWdn"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"kZnxKnOXoK3K4Zd9Es6uV","type":"Entry","createdAt":"2024-07-11T14:24:08.263Z","updatedAt":"2024-07-11T14:24:08.263Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is fuzzing and fuzz testing?","excerpt":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Discover vulnerabilities and enhance software security with fuzzing. Learn techniques, tools, and best practices for fuzz testing in software development.","marks":[],"data":{}}]}]},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"12PvPAvYTL5rc0ZCE0Diif"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"sqKS1UivZKfbmBaOUw44F","type":"Entry","createdAt":"2024-07-10T18:33:57.292Z","updatedAt":"2024-07-10T18:33:57.292Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is runtime application self-protection (RASP)?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn how runtime application self-protection (RASP) protects software against attacks with real-time detection & prevention for application security.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"12PvPAvYTL5rc0ZCE0Diif"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"t6V7QaZcvTk0W10BEh56e","type":"Entry","createdAt":"2024-06-25T02:17:11.331Z","updatedAt":"2024-06-25T02:17:11.331Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Application security testing","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover the importance of application security testing (AST) to ensure the security of your applications. Learn about common types of attacks and vulnerabilities, the role of security testing tools, and best practices for implementing AST in your organization.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"5jk9xlzqocl157dfwxzbrV"}}}}],"Asset":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2xk9Ss2Xsd19aHioDXJvam","type":"Asset","createdAt":"2024-06-25T02:29:34.623Z","updatedAt":"2024-06-25T02:29:34.623Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-LightMode-2","file":{"url":"//images.ctfassets.net/8aevphvgewt8/2xk9Ss2Xsd19aHioDXJvam/48f8d1580007383c424ee3379e30d8a3/Security-LightMode-2.png","details":{"size":476378,"image":{"width":1200,"height":630}},"fileName":"Security-LightMode-2.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6iqN6327Tz9zouhZu7Ow74","type":"Asset","createdAt":"2024-06-25T02:31:15.388Z","updatedAt":"2024-06-25T02:31:15.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-DarkMode-2 1","file":{"url":"//images.ctfassets.net/8aevphvgewt8/6iqN6327Tz9zouhZu7Ow74/c290fdc8b53efcc7ce45fb760feea4b3/Security-DarkMode-2_1.png","details":{"size":93550,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-2_1.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7ETOYx5RKOqnELEHUOZDLa","type":"Asset","createdAt":"2024-07-10T17:57:52.235Z","updatedAt":"2024-07-10T17:57:52.235Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-LightMode-1","file":{"url":"//images.ctfassets.net/8aevphvgewt8/7ETOYx5RKOqnELEHUOZDLa/411bdcc3ff038ff634c8ee060b727c08/Security-LightMode-1.png","details":{"size":105000,"image":{"width":1200,"height":630}},"fileName":"Security-LightMode-1.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"WNgDKEiygdGk22WgaD2TE","type":"Asset","createdAt":"2024-06-24T18:11:33.816Z","updatedAt":"2024-06-24T18:11:33.816Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-DarkMode-1 1","file":{"url":"//images.ctfassets.net/8aevphvgewt8/WNgDKEiygdGk22WgaD2TE/784cf9cc67b019165932538e454ff092/Security-DarkMode-1_1.png","details":{"size":93322,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-1_1.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"ZDIT3ae5vdcud13spe9RW","type":"Asset","createdAt":"2024-07-11T14:41:35.175Z","updatedAt":"2024-07-11T14:41:35.175Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-LightMode-3","file":{"url":"//images.ctfassets.net/8aevphvgewt8/ZDIT3ae5vdcud13spe9RW/5b02b386bbf886ed2d95ce197a2d1909/Security-LightMode-3.png","details":{"size":407759,"image":{"width":1200,"height":630}},"fileName":"Security-LightMode-3.png","contentType":"image/png"}}}]}},"userLoggedIn":false,"additionalProps":{"pageHeading":"Security","page":1,"totalPages":1}},"title":"Security"}