{"id":53443,"date":"2024-03-28T15:07:47","date_gmt":"2024-03-28T19:07:47","guid":{"rendered":"https:\/\/sdtimes.com\/?p=53443"},"modified":"2024-03-29T10:52:12","modified_gmt":"2024-03-29T14:52:12","slug":"the-importance-of-security-testing","status":"publish","type":"post","link":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/","title":{"rendered":"<span class=\"sdt-premium\">premium<\/span> The importance of security testing"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">With more development teams today using open-source and third-party components to build out their applications, the biggest area of concern for security teams has become the API. This is where vulnerabilities are likely to arise, as keeping on top of updating those interfaces has lagged.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a recent survey, the research firm Forrester asked security decision makers in which phase of the application lifecycle did they plan to adopt the following technologies.\u00a0 Static application security testing (SAST) was at 34%, software composition analysis (SCA) was 37%, dynamic application security testing (DAST) was 50% and interactive application security testing (IAST) was at 40%. Janet Worthington, a senior analyst at Forrester advising security and risk professionals, said the number of people planning to adopt SAST was low because it&#8217;s already well-known and people have already implemented the practice and tools.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the drivers for that adoption was the awakening created by the log4j vulnerability, where, she said, developers using open source understand direct dependencies but might not consider dependencies of dependencies.<\/span><\/p>\n<p><b>Open source and SCA<\/b><\/p>\n<p><span style=\"font-weight: 400;\">According to Forrester research, 53% of breaches from external attacks are attributed to the application and the application layer. Worthington explained that while organizations are implementing SAST, DAST and SCA, they are not implementing it for all of their applications. &#8220;When we look at the different tools like SAST and SCA, for example, we&#8217;re seeing more people actually running software composition analysis on their customer-facing applications,&#8221; she said. &#8220;And SAST is getting there as well, but almost 75% of the respondents who we asked are running SCA on all of their external-facing applications, and that, if you can believe it, is much larger than web application firewalls, and WAFs are actually there to protect all your customer-facing applications. Less than 40% of the respondents will say they cover all their applications.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Worthington went on to say that more organizations are seeing the need for software composition analysis because of those breaches, but added that a problem with security testing today is that some of the older tools make it harder to integrate early on in the development life cycle. That is when developers are writing their code, committing code in the CI\/CD pipeline, and on merge requests. &#8220;The reason we&#8217;re seeing more SCA and SAST tools there is because developers get that immediate feedback of, hey, there&#8217;s something up with the code that you just checked in. It&#8217;s still going to be in the context of what they&#8217;re thinking about before they move on to the next sprint. And it&#8217;s the best place to kind of give them that feedback.&#8221;<\/span><\/p>\n<p><strong>RELATED CONTENT: <a href=\"https:\/\/sdtimes.com\/test\/a-guide-to-security-testing-tools\/\">A guide to security testing tools<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The best tools, she said, are not only doing that, but they&#8217;re providing very good remediation guidance. &#8220;What I mean by that is, they&#8217;re providing code examples, to say, &#8216;Hey, somebody found something similar to what you&#8217;re trying to do. Want to fix it this way?'&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rob Cuddy, customer experience executive at HCL Software, said the company is seeing an uptick in remediation. Engineers, he said, say, &#8220;\u2019I can find stuff really well, but I don&#8217;t know how to fix it. So help me do that.\u2019 Auto remediation, I think, is going to be something that continues to grow.&#8221;<\/span><\/p>\n<p><b>Securing APIs<\/b><\/p>\n<p><span style=\"font-weight: 400;\">When asked what the respondents were planning to use during the development phase, Worthington said, 50% said they are planning to implement DAST in development. &#8220;Five years ago you wouldn&#8217;t have seen that, and what this really calls attention to is API security,&#8221; Worthington said. &#8220;[That is] something everyone is trying to get a handle on in terms of what APIs they have, the inventory, what APIs are governed, and what APIs are secured in production.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And now, she added, people are putting more emphasis on trying to understand what APIs they have, and what vulnerabilities may exist in them, during the pre-release phase or prior to production. DAST in development signals an API security approach, she said, because &#8220;as you&#8217;re developing, you develop the APIs first before you develop your web application.&#8221; Forrester, she said, is seeing that as an indicator of companies embracing DevSecOps, and that they are looking to test those APIs early in the development cycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">API security also has a part in software supply chain security, with IAST playing a growing role, and encompassing parts of SCA as well, according to Colin Bell, AppScan CTO at HCL Software. &#8220;Supply chain is more a process than it is necessarily any feature of a product,&#8221; Bell said. &#8220;Products feed into that. So SAST and DAST and IAST all feed into the software supply chain, but bringing that together is something that we&#8217;re working on, and maybe even looking at partners to help.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Forrester&#8217;s Worthington explained that DAST really is black box testing, meaning it doesn&#8217;t have any insights into the application. &#8220;You typically have to have a running version of your web application up, and it&#8217;s sending HTTP requests to try and simulate an attacker,&#8221; she said. &#8220;Now we&#8217;re seeing more developer-focused test tools that don&#8217;t actually need to hit the web application, they can hit the APIs. And that&#8217;s now where you&#8217;re going to secure things \u2013 at the API level.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The way this works, she said, is you use your own functional tests that you use for QA, like smoke tests and automated functional tests. And what IAST does is it watches everything that the application is doing and tries to figure out if there are any vulnerable code paths.<\/span><\/p>\n<p><b>Introducing AI into security<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cuddy and Bell both said they are seeing more organizations building AI and machine learning into their offerings, particularly in the areas of cloud security, governance and risk management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Historically, organizations have operated with a level of what is acceptable risk and what is not, and have understood their threshold. Yet cybersecurity has changed that dramatically, such as when a zero-day event occurs but organizations haven&#8217;t been able to assess that risk before.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;The best example we&#8217;ve had recently of this is what happened with the log4j scenario, where all of a sudden, something that people had been using for a decade, that was completely benign, we found one use case that suddenly means we can get remote code execution and take over,&#8221; Cuddy said. &#8220;So how do you assess that kind of risk? If you&#8217;re primarily basing risk on an insurance threshold or a cost metric, you may be in a little bit of trouble, because things that today are under that threshold that you think are not a problem could suddenly turn into one a year later.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That, he said, is where machine learning and AI come in, with the ability to run thousands \u2013 if not millions \u2013 of scenarios to see if something within the application can be exploited in a particular fashion. And Cuddy pointed out that as most organizations are using AI to prevent attacks, there are unethical people using AI to find vulnerabilities to exploit.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He predicted that five or 10 years down the road, you will ask AI to generate an application according to the data input and prompts it is given.\u00a0 And the AI will write code, but it&#8217;ll be the most efficient, machine-to-machine code that humans might not even understand, he noted.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That will turn around the need for developers. But it comes back to the question of how far out is that going to happen. &#8220;Then,&#8221; Bell said, &#8220;it becomes much more important to worry about, and testing now becomes more important. And we&#8217;ll probably move more towards the traditional testing of the finished product and black box testing, as opposed to testing the code, because what&#8217;s the point of testing the code when we can&#8217;t read the code? It becomes a very different approach.&#8221;<\/span><\/p>\n<p><b>Governance, risk and compliance<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cuddy said HCL is seeing the roles of governance, risk and compliance coming together, where in a lot of organizations, those tend to be three different disciplines. And there&#8217;s a push for having them work together and connect seamlessly. &#8220;And we see that showing up in the regulations themselves,&#8221; he said.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Things like NYDFS [New York Department of Financial Services] regulation is one of my favorite examples of this,&#8221; he continued. &#8220;Years ago, they would say things like you have to have a robust application security program, and we&#8217;d all scratch our heads trying to figure out what robust meant. Now, when you go and look, you have a very detailed listing of all of the different aspects that you now have to comply with. And those are audited every year. And you have to have people dedicated to that responsibility. So we&#8217;re seeing the regulations are now catching up with that, and making the specificity drive the conversation forward.&#8221;<\/span><\/p>\n<p><b>The cost of cybersecurity<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The cost of cybersecurity attacks continues to climb as organizations fail to implement safeguards necessary to defend against ransomware attacks. Cuddy discussed the costs of implementing security versus the cost of paying a ransom.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;A year ago, there were probably a lot more of the hey, you know, look at the level, pay the ransom, it&#8217;s easier,&#8221; he said. But, even if organizations pay the ransom, Cuddy said &#8220;there&#8217;s no guarantee that if we pay the ransom, we&#8217;re going to get a key that actually works, that&#8217;s going to decrypt everything.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But cyber insurance companies have been paying out huge sums and are now requiring organizations to do their own due diligence, and are raising the bar on what you need to do to remain insured. \u201cThey have gotten smart and they&#8217;ve realized \u2018Hey, we&#8217;re paying out an awful lot in these ransomware things. So you better have some due diligence.\u2019 And so what&#8217;s happening now is they are raising the bar on what&#8217;s going to happen to you to stay insured.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;MGM could tell you their horror stories of being down and literally having everything down \u2013 every slot machine, every ATM machine, every cash register,&#8221; Cuddy said. And again, there&#8217;s no guarantee that if you pay off the ransom, that you&#8217;re going to be fine. &#8220;In fact,&#8221; he added, &#8220;I would argue you&#8217;re likely to be attacked again, by the same group. Because now they&#8217;ll just go somewhere else and ransom something else. So I think the cost of not doing it is worse than the cost of implementing good security practices and good measures to be able to deal with that.&#8221;\u00a0<\/span><\/p>\n<h3><b>When applications are used in unexpected ways<\/b><\/h3>\n<blockquote><p><span style=\"font-weight: 400;\">Software testers repeatedly say it&#8217;s impossible to test for ways people might use an application that is not intended. How can you defend against something that you haven&#8217;t even thought of?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rob Cuddy, customer experience executive at HCL Software, tells of how he learned of the log4j vulnerability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;Honestly, I found out about it through Minecraft, that my son was playing Minecraft that day. And I immediately ran up into his room, and I&#8217;m like, &#8216;Hey, are you seeing any bizarre things coming through in the chat here that look like weird textures that don&#8217;t make any sense?&#8217; So who would have anticipated that?&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuddy also related a story from earlier in his career about unintended use and how it was dealt with and how organizations harden against that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;There is always going to be that edge case that your average developer didn&#8217;t think about,&#8221; he began. &#8220;Earlier in my career, doing finite element modeling, I was using a three-dimensional tool, and I was playing around in it one day, and you could make a join of two planes together with a fillet. And I had asked for a radius on that. Well, I didn&#8217;t know any better. So I started using just typical numbers, right? 0, 180, 90, whatever. One of them, I believe it was 90 degrees, caused the software to crash, the window just completely disappeared, everything died.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;So I filed a ticket on it, thinking our software shouldn&#8217;t do that. Couple of days later, I get a much more senior gentleman running into my office going, &#8216;Did you file this? What the heck is wrong with you? Like this is a mathematical impossibility. There&#8217;s no such thing as a 90-degree fillet radius.&#8217; But my argument to him was it shouldn&#8217;t crash. Long story short, I talk with his manager, and it&#8217;s basically yes, software shouldn&#8217;t crash, we need to go fix this. So that senior guy never thought that a young, inexperienced, just fresh out of college guy would come in and misuse the software in a way that was mathematically impossible. So he never accounted for it. So there was nothing to fix. But one day, it happened, right. That&#8217;s what&#8217;s going on in security, somebody&#8217;s going to attack in a way that we have no idea of, and it&#8217;s going to happen. And can we respond at that point?&#8221;\u00a0\u00a0<\/span><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/xQmr97bP7Lo?si=ngtd2JuEypRubQTd\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>With more development teams today using open-source and third-party components to build out their applications, the biggest area of concern for security teams has become the API. This is where vulnerabilities are likely to arise, as keeping on top of updating those interfaces has lagged. In a recent survey, the research firm Forrester asked security  &hellip; <a class=\"read-more\" href=\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\">continue reading<\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":205,"featured_media":53458,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"cybocfi_hide_featured_image":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[2398,15303,1,14430],"tags":[15252,45],"coauthors":[11448],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The importance of security testing - SD Times<\/title>\n<meta name=\"description\" content=\"This buyer\u2019s guide looks at the factors that have led to security testing becoming so important.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of security testing - SD Times\" \/>\n<meta property=\"og:description\" content=\"This buyer\u2019s guide looks at the factors that have led to security testing becoming so important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"SD Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/SDTimesD2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-28T19:07:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-29T14:52:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"261\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Rubinstein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:site\" content=\"@sdtimes\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Rubinstein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\"},\"author\":{\"name\":\"David Rubinstein\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/c5979508a52529c65d558ca23cb64a4a\"},\"headline\":\"premium The importance of security testing\",\"datePublished\":\"2024-03-28T19:07:47+00:00\",\"dateModified\":\"2024-03-29T14:52:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\"},\"wordCount\":2137,\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png\",\"keywords\":[\"HCL\",\"security\"],\"articleSection\":[\"Buyers Guide\",\"Featured\",\"Latest News\",\"Premium\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\",\"url\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\",\"name\":\"The importance of security testing - SD Times\",\"isPartOf\":{\"@id\":\"https:\/\/sdtimes.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png\",\"datePublished\":\"2024-03-28T19:07:47+00:00\",\"dateModified\":\"2024-03-29T14:52:12+00:00\",\"description\":\"This buyer\u2019s guide looks at the factors that have led to security testing becoming so important.\",\"breadcrumb\":{\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png\",\"width\":200,\"height\":261},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sdtimes.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The importance of security testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sdtimes.com\/#website\",\"url\":\"https:\/\/sdtimes.com\/\",\"name\":\"SD Times\",\"description\":\"Software Development News\",\"publisher\":{\"@id\":\"https:\/\/sdtimes.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sdtimes.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sdtimes.com\/#organization\",\"name\":\"SD Times\",\"url\":\"https:\/\/sdtimes.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"contentUrl\":\"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png\",\"width\":225,\"height\":90,\"caption\":\"SD Times\"},\"image\":{\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/SDTimesD2\",\"https:\/\/x.com\/sdtimes\",\"https:\/\/www.linkedin.com\/company\/sdtimes\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/c5979508a52529c65d558ca23cb64a4a\",\"name\":\"David Rubinstein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sdtimes.com\/#\/schema\/person\/image\/efe807ec0a4a29a22c1ba89dd5689fe2\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b3fdab44b2a65d11f93bdc301690be3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b3fdab44b2a65d11f93bdc301690be3?s=96&d=mm&r=g\",\"caption\":\"David Rubinstein\"},\"description\":\"David Rubinstein is editor-in-chief of SD Times.\",\"url\":\"https:\/\/sdtimes.com\/author\/david-rubinstein\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The importance of security testing - SD Times","description":"This buyer\u2019s guide looks at the factors that have led to security testing becoming so important.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/","og_locale":"en_US","og_type":"article","og_title":"The importance of security testing - SD Times","og_description":"This buyer\u2019s guide looks at the factors that have led to security testing becoming so important.","og_url":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/","og_site_name":"SD Times","article_publisher":"https:\/\/www.facebook.com\/SDTimesD2","article_published_time":"2024-03-28T19:07:47+00:00","article_modified_time":"2024-03-29T14:52:12+00:00","og_image":[{"width":200,"height":261,"url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png","type":"image\/png"}],"author":"David Rubinstein","twitter_card":"summary_large_image","twitter_creator":"@sdtimes","twitter_site":"@sdtimes","twitter_misc":{"Written by":"David Rubinstein","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#article","isPartOf":{"@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/"},"author":{"name":"David Rubinstein","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/c5979508a52529c65d558ca23cb64a4a"},"headline":"premium The importance of security testing","datePublished":"2024-03-28T19:07:47+00:00","dateModified":"2024-03-29T14:52:12+00:00","mainEntityOfPage":{"@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/"},"wordCount":2137,"publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"image":{"@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png","keywords":["HCL","security"],"articleSection":["Buyers Guide","Featured","Latest News","Premium"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/","url":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/","name":"The importance of security testing - SD Times","isPartOf":{"@id":"https:\/\/sdtimes.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage"},"image":{"@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png","datePublished":"2024-03-28T19:07:47+00:00","dateModified":"2024-03-29T14:52:12+00:00","description":"This buyer\u2019s guide looks at the factors that have led to security testing becoming so important.","breadcrumb":{"@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#primaryimage","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2024\/01\/Copy-of-Generative-AILow-Code-Buyers-Guide.png","width":200,"height":261},{"@type":"BreadcrumbList","@id":"https:\/\/sdtimes.com\/test\/the-importance-of-security-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sdtimes.com\/"},{"@type":"ListItem","position":2,"name":"The importance of security testing"}]},{"@type":"WebSite","@id":"https:\/\/sdtimes.com\/#website","url":"https:\/\/sdtimes.com\/","name":"SD Times","description":"Software Development News","publisher":{"@id":"https:\/\/sdtimes.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sdtimes.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sdtimes.com\/#organization","name":"SD Times","url":"https:\/\/sdtimes.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/","url":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","contentUrl":"https:\/\/sdtimes.com\/wp-content\/uploads\/2014\/05\/deafaultlogo.png","width":225,"height":90,"caption":"SD Times"},"image":{"@id":"https:\/\/sdtimes.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/SDTimesD2","https:\/\/x.com\/sdtimes","https:\/\/www.linkedin.com\/company\/sdtimes\/"]},{"@type":"Person","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/c5979508a52529c65d558ca23cb64a4a","name":"David Rubinstein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sdtimes.com\/#\/schema\/person\/image\/efe807ec0a4a29a22c1ba89dd5689fe2","url":"https:\/\/secure.gravatar.com\/avatar\/1b3fdab44b2a65d11f93bdc301690be3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b3fdab44b2a65d11f93bdc301690be3?s=96&d=mm&r=g","caption":"David Rubinstein"},"description":"David Rubinstein is editor-in-chief of SD Times.","url":"https:\/\/sdtimes.com\/author\/david-rubinstein\/"}]}},"_links":{"self":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/53443"}],"collection":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/comments?post=53443"}],"version-history":[{"count":5,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/53443\/revisions"}],"predecessor-version":[{"id":53693,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/posts\/53443\/revisions\/53693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media\/53458"}],"wp:attachment":[{"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/media?parent=53443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/categories?post=53443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/tags?post=53443"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/sdtimes.com\/wp-json\/wp\/v2\/coauthors?post=53443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}