{"id":990542,"date":"2025-01-21T08:00:00","date_gmt":"2025-01-21T05:00:00","guid":{"rendered":"https:\/\/gpss.ro\/security-news\/scaling-dynamic-application-security-testing-dast\/"},"modified":"2025-01-21T08:00:00","modified_gmt":"2025-01-21T05:00:00","slug":"scaling-dynamic-application-security-testing-dast","status":"publish","type":"security_news","link":"https:\/\/delve.ro\/ro\/security-news\/scaling-dynamic-application-security-testing-dast\/","title":{"rendered":"Scaling Dynamic Application Security Testing (DAST)"},"content":{"rendered":"<p>Introduction Microsoft engineering teams use the Security Development Lifecycle to ensure our products are built in alignment with Microsoft\u2019s Secure Future Initiative security principles: Secure by Design, Secure by Default, and Secure Operations. A key component of the Security Development Lifecycle is security testing, which aims to discover and mitigate security vulnerabilities before adversaries can exploit them.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction Microsoft engineering teams use the Security Development Lifecycle to ensure our products are built in alignment with Microsoft\u2019s Secure Future Initiative security principles: Secure by Design, Secure by Default, and Secure Operations. A key component of the Security Development Lifecycle is security testing, which aims to discover and mitigate security vulnerabilities before adversaries can [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"footnotes":""},"news_region":[152],"news_source":[165],"news_severity":[146],"class_list":["post-990542","security_news","type-security_news","status-publish","hentry","news_region-international","news_source-microsoft","news_severity-low"],"_links":{"self":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security-news-items\/990542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security-news-items"}],"about":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/types\/security_news"}],"version-history":[{"count":0,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security-news-items\/990542\/revisions"}],"wp:attachment":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/media?parent=990542"}],"wp:term":[{"taxonomy":"news_region","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_region?post=990542"},{"taxonomy":"news_source","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_source?post=990542"},{"taxonomy":"news_severity","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_severity?post=990542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}