As a relatively new security category, many security operators and executives I’ve met have asked us “What are these Automated Security Validation (ASV) tools?” We’ve covered that pretty extensively in the past, so today, instead of covering the “What is ASV?” I wanted to address the “Why ASV?” question. In this article, we’ll cover some common use cases and misconceptions of how people misuse

- November 21, 2024
- by
- Cyber News
- Less than a minute
- 65 Views
Related Post
- by Francis Schmuff
- April 4, 2025
Cyber Forensic Expert in 2,000+ Cases Faces FBI
A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30
- by Francis Schmuff
- April 4, 2025
SpotBugs Access Token Theft Identified as Root Cause
The cascading supply chain attack that initially targeted Coinbase before becoming more widespread to single out users of the “tj-actions/changed-files”
- by Francis Schmuff
- April 4, 2025
Troy Hunt Gets Phished
In case you need proof that anyone, even people who do cybersecurity for a living, Troy Hunt has a long,
- by Francis Schmuff
- April 4, 2025
Have We Reached a Distroless Tipping Point?
There’s a virtuous cycle in technology that pushes the boundaries of what’s being built and how it’s being used. A