Netsparker is now Invicti
Get a demo
Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World AppSec with Zero Noise Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World Get a demo
Get a demo
  • Product
    • Web Application Security
    • API Security
    • Features
    • DAST
    • SAST
  • Why Us?
    • Solutions
      • Industries
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • Roles
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Comparison
    • Case studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our Story
    • In the news
    • Careers
    • Contact us
  • Resources
    • Blog
    • White Papers
    • Webinars
    • Resource Library
    • Invicti Learn
    • Partners
      • Channel
      • MSSP
    • Support
Web Security Blog
  • Web Security
  • News
  • Product Docs & FAQs

HTTP security headers: An easy way to harden your web applications

Modern browsers and web servers support many HTTP headers that can greatly improve web application security to protect against clickjacking, cross-site scripting, and other common types of attacks. This post provides an overview of best-practice HTTP security headers that you should be setting in your websites and applications and shows how to use DAST to make sure you’re doing it right.

Read more

About that vulnerability… Are you sure it’s fixed?

The HHS outlines vital new pillars of action for cybersecurity in healthcare

3 big reasons why 2024 will be a fierce and noisy year for cybersecurity

CVSS 4.0 is here. Will it make vulnerability scores more useful?

The DevSecOps benefits of cloud-native security

Never mind the buzzwords: Here’s the straight deal on application security

Looking for the best in DAST: How to select DAST tools for DevSecOps

SolarWinds, the SEC, and the CISO: Who is legally responsible for security?

An abundance of caution: Why the curl buffer overflow is not the next Log4Shell

Rapid Reset HTTP/2 vulnerability: When streaming leads to flooding

Top 5 application security misconfigurations

Hacking the hackers: Borrowing good habits from bad actors

< 1 2 3 4 5 6 … 40 >
Invicti Logo - The Largest Dynamic Application Security Solutions Provider In The World

Invicti Security Corp
1000 N Lamar Blvd Suite 300
Austin, TX 78703, US

© Invicti 2024

  • RESOURCES
    • Features
    • Integrations
    • Plans
    • Case Studies
    • Changelogs
    • Invicti Learn
  • USE CASES
    • Penetration Testing Software
    • Website Security Scanner
    • Ethical Hacking Software
    • Web Vulnerability Scanner
    • Comparisons
    • Online Application Scanner
  • WEB SECURITY
    • The Problem with False Positives
    • Why Pay for Web Scanners
    • SQL Injection Cheat Sheet
    • Getting Started with Web Security
    • Vulnerability Index
    • Using Content Security Policy to Secure Web Applications
  • COMPARISON
    • Burp Suite vs. Invicti
    • Probely vs. Invicti
    • Acunetix vs. Invicti
    • Qualys vs. Invicti
    • Tenable Nessus vs. Invicti
  • COMPANY
    • About Us
    • Contact Us
    • Support
    • Careers
    • Resources
    • Partners
© Invicti 2024
  • Compliance
  • Legal
  • Privacy Policy
  • California Privacy Rights
  • Terms of Use
  • Accessibility
  • Sitemap

By using this website you agree with our use of cookies to improve its performance and enhance your experience. More information in our Privacy Policy.