Last updated at Wed, 12 Feb 2020 18:47:04 GMT

A version of this blog was originally posted on July 18, 2013

With application security it seems there is never a dull moment. Different facets of web security continue to evolve from the hackers and the hacks to the techniques we use to combat them. Here are some of the trends we see emerging and maturing as best practices. Let us know if you are implementing these and how it's going!

1. Continuous Scanning

There's a lot of buzz around the concept of continuous scanning, but in the world of application security, continuous scanning is sort of a misnomer because you don't really want all of your applications scanned all the time and it would be an unreasonable use of hardware and bandwidth. In reality, continuous application scanning means constantly monitoring applications for changes and automatically launching a scan when the application has changed. Talk to your vendor about their ability to conduct this “continuous scanning” or site monitoring with automatic re-scans.

2. Continuous Integration (CI)

Many organizations are pushing development to use Continuous Integration solutions (such as or or home grown solutions) to streamline QA efforts and to reduce time to market. Security teams are wise to find ways to plug their scanning activity into the CI to ensure that every build is security tested before it goes into production. This requires a scanner that works well in “point and shoot” mode and offers open API's for running scans. Ask your vendor how their scanner would fit into your CI environment.

3. Web Browser Automation Integration

Most enterprise testing teams already use test automation tools & scripts such as to create repeatable tests that can be executed in conjunction with nightly application builds. It only makes sense to integrate security tests into this as well so that security tests can run automatically every time the application changes. This is a great way to catch application security vulnerabilities early and often.

For more information on the key trends and best practices in application security, check out the new Application Security Requirements: 15 Requirements and Best Practices for Buyers.

Note: This blog has been transferred from Dan Kuykendall's blog,, as part of Rapid7's acquisition of NT OBJECTives. For more information on the acquisition, click here.