{"id":"7d01e733-7d5b-4b62-9e1f-491e18c41c04","timestamp":1770778787863,"matcher":{"static":{},"wildcard":{},"dynamic":{}},"prerendered":["/video/security-checks-in-ci-cd-with-kondukto","/video/how-to-open-issues-with-kondukto","/video/validation-scans-on-kondukto","/video/how-to-start-scans-on-kondukto","/video/personalized-courses-with-kondukto","/video/automation-for-manually-imported-vulnerabilities","/customer-story/trendyol","/customer-story/odeal","/jobs/junior-backend-developer","/jobs/security-consultant","/jobs/product-marketing-manager","/jobs/senior-backend-developer","/jobs/sales-engineer","/jobs/platform-engineer","/jobs/junior-frontend-developer","/blog/a-major-milestone-and-the-future-of-aspm","/blog/customizable-roles-and-permission-in-aspm-platforms","/blog/okta-vulnerability-bcrypt-auth","/blog/ebpf-vulnerabilities-ecosystem-and-security-model","/blog/building-secure-by-default-a-guide-to-zero-cve-container-images","/blog/the-advantage-of-using-vex-sboms","/blog/generating-build-time-sboms-with-cyclonedx-and-kondukto","/blog/github-action-tj-actions-changed-files-supply-chain-attack-what-we-have-learned-","/blog/empowering-developers-in-appsec-scaling-and-metrics","/blog/linux-kernel-effected-by-cve-2023-2163","/blog/empowering-developers-in-application-security-triage-and-collaboration","/blog/protecting-apis-of-modern-applications","/blog/enhancing-vulnerability-management-with-threat-intelligence","/blog/ruby-affected-by-cve-2024-45409","/blog/enhancing-appsec-through-fuzzing-in-ci-cd-pipelines","/blog/git-scm-affected-by-cve-2024-32002","/blog/4-ways-to-improve-appsec-accountability","/blog/google-cloud-affected-by-cve-2021-30476","/blog/bring-your-own-data-byod-to-the-kondukto-platform","/blog/kntrl-integrates-open-policy-agent","/blog/introducing-kntrl-enhancing-ci-cd-security-with-ebpf","/blog/supply-chain-security-snags","/blog/securing-ci-cd-runners-through-ebpf","/blog/microsoft-azure-cli-affected-by-cve-2022-39327","/blog/why-sbom-matters-infographic","/blog/splunk-enterprise-affected-by-cve-2023-40598","/blog/create-sbom-on-gradle-with-the-cyclonedx-plugin","/blog/running-dast-in-ci-cd-for-regression-testing","/blog/enhancing-security-with-ebpf-use-cases-explored","/blog/how-malicious-code-enters-applications","/blog/a-look-into-modern-security-orchestration","/blog/aspm-and-security-testing-orchestration","/blog/container-security-a-quick-overview","/blog/unveiling-java-library-vulnerabilities-through-xxe-exploration","/blog/how-to-streamline-vulnerability-management","/blog/how-to-shift-left-better-with-git-hooks","/blog/ai-remediation-a-massive-time-saver","/blog/getting-started-a-guide-to-becoming-a-product-security-engineer","/blog/winning-management-support-as-an-appsec-leader","/blog/demo-hub-launched-for-kondukto-technology-partners","/blog/how-to-get-developer-buy-in-for-appsec-programs","/blog/how-to-integrate-continuous-api-fuzzing-into-cicd","/blog/top-10-reasons-to-implement-an-aspm-right-now","/blog/kondukto-openai-chatgpt","/blog/the-economics-of-aspm","/blog/application-security-engineer","/blog/announcing-our-seed-round","/blog/docker-security-best-practices-with-semgrep","/blog/appsec_for_developers","/blog/owasp-asvs","/appsec-glossary/threat-intelligence","/blog/why-application-security-testing-orchestration-asto-is-a-need","/appsec-glossary/pci-dss-compliance","/blog/why-you-should-not-mark-heap-inspection-as-false-positive","/blog/why-static-and-dynamic-application-security-testing-tools-should-be-used-in-tandem","/blog/keep-an-eye-on-your-remediation-performance","/blog/what-is-the-optimal-security-scan-time-for-my-applications","/blog/benefits-of-automating-issue-opening-process","/appsec-glossary/input-validation","/blog/damage-limitation-strategies-for-developers","/appsec-glossary/malicious-code","/appsec-glossary/keyloggers","/blog/ssdlc-guide-for-beginners","/blog/why-care-about-application-security-at-all","/appsec-glossary/container-security","/blog/how-to-improve-appsec-posture-for-starters","/appsec-glossary/application-lifecycle-management-alm","/appsec-glossary/application-security","/blog/the-day-after-devsecops-revolution","/appsec-glossary/api-security","/blog/keep-applications-secure-while-keeping-your-distance","/appsec-glossary/api","/blog/5-circular-phases-of-sec-in-devsecops","/appsec-glossary/application-security-posture-management-aspm","/appsec-glossary/applilcation-vulnerability","/blog/scapegoats-for-security-vulnerabilities","/blog/defensive-programming-tips","/appsec-glossary/infrastructure-as-code-iac","/blog/cybersecurity-as-a-marketing-activity","/blog/key-benefits-of-asoc","/appsec-glossary/devsecops","/blog/defensive-programming-tips-2-ldap-injection","/appsec-glossary/iac-security","/appsec-glossary/devops-security","/blog/security-training-for-developers","/appsec-glossary/continuous-integration-ci","/appsec-glossary/devops","/blog/max-out-your-developers-potential-with-relevant-security-training","/blog/aligning-multiple-teams-devsecops","/blog/vulnerability-management-in-gitflow","/appsec-glossary/continuous-deployment-cd","/appsec-glossary/ci-cd-security","/blog/devsecops-mistakes","/blog/kondukto-cli-in-ci-cd-pipelines","/appsec-glossary/ci-cd","/appsec-glossary/ai-security","/blog/sbom-software-bill-of-materials","/events","/blog/how-to-generate-and-audit-sbom-in-a-ci-cd-pipeline","/blog/get-management-buy-in-with-appsec-metrics","/blog/insecure-deserialization","/appsec-glossary/agile-security","/blog/how-to-boost-sast-performance","/resources","/blog/3-ways-using-asvs-can-help-your-organization","/blog/devsecops-engineer-skills","/resources/candyshop-devsecops","/solutions/kondukto-vs-armorcode","/solutions/workflow-automation","/solutions/kondukto-vs-oxsecurity","/solutions/kondukto-vs-codedx","/solutions/vulnerability-management","/solutions/application-security-testing-orchestration","/solutions/application-security-posture-management","/solutions/security-kpis","/video/create-custom-integrations-for-security-tools-in-londukto-aspm","/integrations","/video/install-kondukto-aspm-on-premise-in-under-a-minute","/careers","/blog","/about-us","/platform","/","/solutions/ciso","/solutions/appsec","/solutions/devsecops","/solutions/appsec-novice","/solutions/appsec-mover","/platform/vulnerability-management","/platform/sbom","/platform/integrations","/platform/automation","/platform/appsec-metrics","/solutions/appsec-expert","/videos","/customer-stories","/resources/cost-savings-calculator","/resources/enterprise-aspm","/solutions/security-champions","/request-a-demo","/terms-and-conditions","/eula","/trust/subprocessors","/thank-you","/privacy-policy","/platform-tour","/cookie-policy","/appsec-glossary"]}