{"payload":{"contentfulRawJsonResponse":{"sys":{"type":"Array"},"total":13,"skip":0,"limit":1000,"items":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2aVRXEdIZaSn9mafEMxmbB","type":"Entry","createdAt":"2024-07-11T16:47:51.742Z","updatedAt":"2024-07-11T16:47:51.742Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is security testing?","path":"/resources/articles/security/what-is-security-testing","template":{"sys":{"type":"Link","linkType":"Entry","id":"6W8M3TkBdb4YSgiP1l5PSy"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"1NYfjJ5lexeaA2zXNqI8qb"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"2l4n7DkukRcFFBePgpPEVS"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4Qe0uOEMbW9ZUYounYcY7M","type":"Entry","createdAt":"2024-07-11T15:41:55.267Z","updatedAt":"2024-07-11T15:41:55.267Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is vulnerability scanning?","path":"/resources/articles/security/what-is-vulnerability-scanning","template":{"sys":{"type":"Link","linkType":"Entry","id":"2R2zyu2vx2gQSmEHZyZ2dy"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"17Cv0mCD8sTuIQBifhEG7V"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"1ZI36wEk0jwwc1NqSMvWZE"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2AuwH9US7ECUONY6bShBz6","type":"Entry","createdAt":"2024-07-11T14:41:35.212Z","updatedAt":"2024-07-11T14:41:35.212Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is threat modeling?","path":"/resources/articles/security/what-is-threat-modeling","template":{"sys":{"type":"Link","linkType":"Entry","id":"8cpgkmneHHbdV2eAlVkgh"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"2VuQ7ix1PRrVJULOYCjNJt"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"2CNrE17sj5fsYvZ0NfKusl"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1aPqB6Is4fCxlilIBwZx0U","type":"Entry","createdAt":"2024-07-11T14:24:08.164Z","updatedAt":"2024-07-11T14:24:08.164Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is fuzzing and fuzz testing?","path":"/resources/articles/security/what-is-fuzz-testing","template":{"sys":{"type":"Link","linkType":"Entry","id":"kZnxKnOXoK3K4Zd9Es6uV"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"1TRZdvwNA35bOsXUKiBtFv"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"1V62uS85rTb9fjwJvgorov"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6sYLiTesammFoNXGzDuAGG","type":"Entry","createdAt":"2024-07-10T18:33:57.176Z","updatedAt":"2024-07-10T18:33:57.176Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is runtime application self-protection (RASP)?","path":"/resources/articles/security/what-is-rasp","template":{"sys":{"type":"Link","linkType":"Entry","id":"sqKS1UivZKfbmBaOUw44F"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"4lR3xF9SZzBGNNqmCOzKV6"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"450gwHLlMfblW33FIj8RuC"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3K3C5SXFML9JQZTC0fhBBT","type":"Entry","createdAt":"2024-07-10T17:57:52.273Z","updatedAt":"2024-07-10T17:58:10.976Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Mobile application security","path":"/resources/articles/security/mobile-application-security","template":{"sys":{"type":"Link","linkType":"Entry","id":"7Brud44tR7OqXK3GP1kC6a"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"3IVq7QMJxiEUmCydUQsEsZ"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"6gi21okIffGqOIGuMAdxkb"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2y2D9HlWG7aENxl4QBNnEd","type":"Entry","createdAt":"2024-07-10T15:49:54.776Z","updatedAt":"2024-07-10T17:47:45.237Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is SAST?","path":"/resources/articles/security/what-is-sast","template":{"sys":{"type":"Link","linkType":"Entry","id":"1XqtshwYwAcQXCpO3lQ4bB"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"6SDWk6OvCCwqNgrn1Eb0TK"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"7E4fqsqlOJbznmAkGQF2iI"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"wndfd3LteQ1gBcXcRZk9Z","type":"Entry","createdAt":"2024-07-10T17:44:19.519Z","updatedAt":"2024-07-10T17:45:04.557Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Application security posture management (ASPM)","path":"/resources/articles/security/application-security-posture-management","template":{"sys":{"type":"Link","linkType":"Entry","id":"5LADAn7FwwSl2NrJnb9gw1"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"5OsbamVzZLhgvdowVwFX9o"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"7btbAw95LMPHwQ134JxhKr"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"BK3uBqJYJSdMn1dGkkXTy","type":"Entry","createdAt":"2024-06-25T02:11:56.726Z","updatedAt":"2024-07-08T13:08:58.810Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"What is application security and how does it work?","path":"/resources/articles/security/what-is-application-security","template":{"sys":{"type":"Link","linkType":"Entry","id":"49CZLUcrGvFOPyLYAvuMn2"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"31o7Q9zI7l4Mj1TraoDcW7"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"5u1t1Wv9TGVYwuTFWnwDOo"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7gP64xn3vkY2cRhZyWN128","type":"Entry","createdAt":"2024-06-25T02:17:11.242Z","updatedAt":"2024-06-25T02:17:11.242Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Application security testing","path":"/resources/articles/security/application-security-testing","template":{"sys":{"type":"Link","linkType":"Entry","id":"t6V7QaZcvTk0W10BEh56e"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"10JlCKLpbXP6tHBcK5nuy1"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"197IauMaeNEO5TLJjBRETp"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4O0twTc06gQW2RNrFzkKZh","type":"Entry","createdAt":"2024-06-24T18:11:33.841Z","updatedAt":"2024-06-24T18:11:33.841Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Dynamic application security testing (DAST)","path":"/resources/articles/security/what-is-dast","template":{"sys":{"type":"Link","linkType":"Entry","id":"5MoYAecD2ZqO8SKeyGKo93"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"5eAggjDO1i1hGw98hVBxpc"}}}}],"includes":{"Entry":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"10JlCKLpbXP6tHBcK5nuy1","type":"Entry","createdAt":"2024-06-25T02:17:11.546Z","updatedAt":"2024-06-25T02:17:11.546Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-testing","featureFlag":"contentful_lp_seo_pages","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"12PvPAvYTL5rc0ZCE0Diif","type":"Entry","createdAt":"2024-06-25T02:31:15.515Z","updatedAt":"2024-06-25T02:31:15.515Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Dark 2","image":{"sys":{"type":"Link","linkType":"Asset","id":"6iqN6327Tz9zouhZu7Ow74"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"17Cv0mCD8sTuIQBifhEG7V","type":"Entry","createdAt":"2024-07-11T15:41:56.317Z","updatedAt":"2024-07-17T13:47:33.206Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-vulnerability-scanning","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"197IauMaeNEO5TLJjBRETp","type":"Entry","createdAt":"2024-06-25T02:17:11.564Z","updatedAt":"2024-06-25T02:17:11.564Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-testing SEO","description":"Discover the importance of application security testing (AST) to ensure the security of your applications. Learn about common types of attacks and vulnerabilities, the role of security testing tools, and best practices for implementing AST in your organization."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1NYfjJ5lexeaA2zXNqI8qb","type":"Entry","createdAt":"2024-07-11T16:47:52.453Z","updatedAt":"2024-07-17T13:48:16.205Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-security-testing","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1TRZdvwNA35bOsXUKiBtFv","type":"Entry","createdAt":"2024-07-11T14:24:08.938Z","updatedAt":"2024-07-17T13:45:38.243Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-fuzz-testing","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1V62uS85rTb9fjwJvgorov","type":"Entry","createdAt":"2024-07-11T14:24:09.138Z","updatedAt":"2024-07-11T14:24:09.138Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-fuzz-testing","description":"Discover vulnerabilities and enhance software security with fuzzing. Learn techniques, tools, and best practices for fuzz testing in software development."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1XqtshwYwAcQXCpO3lQ4bB","type":"Entry","createdAt":"2024-07-10T15:49:54.926Z","updatedAt":"2024-07-10T15:51:15.679Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is SAST?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover benefits, scanning tools, & best practices of Static Application Security Testing (SAST) to enhance code security and mitigate vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"5jk9xlzqocl157dfwxzbrV"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1ZI36wEk0jwwc1NqSMvWZE","type":"Entry","createdAt":"2024-07-11T15:41:56.335Z","updatedAt":"2024-07-11T15:41:56.335Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-vulnerability-scanning","description":"Discover the importance of vulnerability scanning in software development. Learn about vulnerability assessment, analysis, mitigation, and scanning tools."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2CNrE17sj5fsYvZ0NfKusl","type":"Entry","createdAt":"2024-07-11T14:41:36.299Z","updatedAt":"2024-07-11T14:41:36.299Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-threat-modeling","description":"Threat modeling is a structured process that identifies security threats across systems during the design and planning phases of software production."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2R2zyu2vx2gQSmEHZyZ2dy","type":"Entry","createdAt":"2024-07-11T15:41:55.375Z","updatedAt":"2024-07-11T15:41:55.375Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is vulnerability scanning?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover the importance of vulnerability scanning in software development. Learn about vulnerability assessment, analysis, mitigation, and scanning tools.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"3xH3Mi0Vz2ithc5TGSe1Jg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2VuQ7ix1PRrVJULOYCjNJt","type":"Entry","createdAt":"2024-07-11T14:41:36.282Z","updatedAt":"2024-07-17T13:46:55.491Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-threat-modeling","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2l4n7DkukRcFFBePgpPEVS","type":"Entry","createdAt":"2024-07-11T16:47:52.538Z","updatedAt":"2024-07-11T16:47:52.538Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-security-testing","description":"Learn about security testing with our guide to security testing types, tools, and scanning methods, and best practices and trends for greater software security."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"31o7Q9zI7l4Mj1TraoDcW7","type":"Entry","createdAt":"2024-06-25T02:11:57.428Z","updatedAt":"2024-06-25T02:11:57.428Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-application-security","featureFlag":"contentful_lp_seo_pages","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3IVq7QMJxiEUmCydUQsEsZ","type":"Entry","createdAt":"2024-07-10T17:57:53.321Z","updatedAt":"2024-07-17T13:44:17.627Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/mobile-application-security","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3MxazAf6RYk0TIBNgzSwxQ","type":"Entry","createdAt":"2024-07-25T15:48:21.687Z","updatedAt":"2024-07-25T15:48:21.687Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-software-composition-analysis","description":"Software composition analysis (SCA) helps developers identify and manage security vulnerabilities in open source software, leading to more compliant, better quality code. "}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3xH3Mi0Vz2ithc5TGSe1Jg","type":"Entry","createdAt":"2024-06-24T18:11:33.957Z","updatedAt":"2024-06-24T18:11:33.957Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Dark 1","image":{"sys":{"type":"Link","linkType":"Asset","id":"WNgDKEiygdGk22WgaD2TE"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"450gwHLlMfblW33FIj8RuC","type":"Entry","createdAt":"2024-07-10T18:33:57.637Z","updatedAt":"2024-07-10T18:33:57.637Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-rasp","description":"Learn how runtime application self-protection (RASP) protects software against attacks with real-time detection & prevention for application security."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"49CZLUcrGvFOPyLYAvuMn2","type":"Entry","createdAt":"2024-06-25T02:11:56.832Z","updatedAt":"2024-06-25T02:31:15.425Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is application security and how does it work?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Get an overview of what application security is and how it works, as well as best practices. Learn more about the importance of application security and how to safeguard your apps.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"12PvPAvYTL5rc0ZCE0Diif"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4IBnoguefNOpgHd59ztqlJ","type":"Entry","createdAt":"2024-07-25T16:02:06.089Z","updatedAt":"2024-07-25T16:02:06.089Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-shift-left-testing","description":"Explore the benefits of shift left in software development, like early testing and efficient scanning strategies within the software development lifecycle."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4fxbaeA542EtWiwEEk3RiO","type":"Entry","createdAt":"2024-07-25T15:48:21.671Z","updatedAt":"2024-07-25T15:48:21.671Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-software-composition-analysis","featureFlag":"contentful_lp_staffship","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4lR3xF9SZzBGNNqmCOzKV6","type":"Entry","createdAt":"2024-07-10T18:33:57.570Z","updatedAt":"2024-07-17T13:43:44.029Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-rasp","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5GWzTcPVLUwf5QhQR1zX95","type":"Entry","createdAt":"2024-07-10T17:57:52.594Z","updatedAt":"2024-07-10T17:57:52.594Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Light 1","image":{"sys":{"type":"Link","linkType":"Asset","id":"7ETOYx5RKOqnELEHUOZDLa"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5LADAn7FwwSl2NrJnb9gw1","type":"Entry","createdAt":"2024-07-10T17:44:19.629Z","updatedAt":"2024-07-10T17:44:19.629Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Application security posture management (ASPM)","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn more about application security posture management for insights and explore best practices to increase protection against evolving cyber threats.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"3xH3Mi0Vz2ithc5TGSe1Jg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5MoYAecD2ZqO8SKeyGKo93","type":"Entry","createdAt":"2024-06-24T18:11:33.937Z","updatedAt":"2024-06-24T18:12:19.646Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Dynamic application security testing (DAST)","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"DAST is an AppSec method that simulates attacks to test web apps for security issues.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"3xH3Mi0Vz2ithc5TGSe1Jg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5OsbamVzZLhgvdowVwFX9o","type":"Entry","createdAt":"2024-07-10T17:44:20.145Z","updatedAt":"2024-07-17T13:44:53.592Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-posture-management","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5eAggjDO1i1hGw98hVBxpc","type":"Entry","createdAt":"2024-06-24T18:11:34.285Z","updatedAt":"2024-06-24T18:11:34.285Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-dast SEO","description":"DAST is an AppSec method that simulates attacks to test web apps for security issues."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5jk9xlzqocl157dfwxzbrV","type":"Entry","createdAt":"2024-06-25T02:11:56.853Z","updatedAt":"2024-06-25T02:30:50.216Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Light 3","image":{"sys":{"type":"Link","linkType":"Asset","id":"2xk9Ss2Xsd19aHioDXJvam"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5u1t1Wv9TGVYwuTFWnwDOo","type":"Entry","createdAt":"2024-07-08T13:08:56.160Z","updatedAt":"2024-07-08T13:08:56.160Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-application-security SEO","description":"Learn more about the importance of app security and how to safeguard your applications."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5vzkFSMe2hUn6eTFuDPhkA","type":"Entry","createdAt":"2024-07-25T16:02:05.630Z","updatedAt":"2024-07-25T16:02:05.630Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is shift left testing?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Explore the benefits of shift left in software development, like early testing and efficient scanning strategies within the software development lifecycle.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"12PvPAvYTL5rc0ZCE0Diif"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"68Y8fBu8irzBDuxCO1ZU8k","type":"Entry","createdAt":"2024-07-25T15:48:21.305Z","updatedAt":"2024-07-25T15:48:21.305Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is software composition analysis (SCA)?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Software composition analysis (SCA) helps developers identify and manage security vulnerabilities in open source software, leading to more compliant, better quality code. ","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"3xH3Mi0Vz2ithc5TGSe1Jg"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"69EibalzHbLKlAqlCdsWdn","type":"Entry","createdAt":"2024-07-11T14:41:35.534Z","updatedAt":"2024-07-11T14:41:35.534Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"backgroundImage"}},"locale":"en-US"},"fields":{"title":"Security - Light 3","image":{"sys":{"type":"Link","linkType":"Asset","id":"ZDIT3ae5vdcud13spe9RW"}},"focus":"center","colorMode":"inherit"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6SDWk6OvCCwqNgrn1Eb0TK","type":"Entry","createdAt":"2024-07-10T15:49:55.395Z","updatedAt":"2024-07-17T13:39:51.741Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-sast","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6W8M3TkBdb4YSgiP1l5PSy","type":"Entry","createdAt":"2024-07-11T16:47:51.869Z","updatedAt":"2024-07-11T16:47:51.869Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is security testing?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn about security testing with our guide to security testing types, tools, and scanning methods, and best practices and trends for greater software security.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"69EibalzHbLKlAqlCdsWdn"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6gi21okIffGqOIGuMAdxkb","type":"Entry","createdAt":"2024-07-10T17:57:53.338Z","updatedAt":"2024-07-10T17:57:53.338Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/mobile-application-security","description":"Learn how mobile application security protects mobile apps from software vulnerabilities, cyberthreats, and data breaches."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6kZsUgWzxwX6dpo0Gm7aC6","type":"Entry","createdAt":"2024-07-25T16:02:06.071Z","updatedAt":"2024-07-25T16:02:06.071Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-shift-left-testing","featureFlag":"contentful_lp_staffship","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7Brud44tR7OqXK3GP1kC6a","type":"Entry","createdAt":"2024-07-10T17:57:52.528Z","updatedAt":"2024-07-10T17:58:08.968Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Mobile application security","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn how mobile application security protects mobile apps from software vulnerabilities, cyberthreats, and data breaches.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"5GWzTcPVLUwf5QhQR1zX95"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7E4fqsqlOJbznmAkGQF2iI","type":"Entry","createdAt":"2024-07-10T15:49:55.409Z","updatedAt":"2024-07-10T15:49:55.409Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/what-is-sast"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7btbAw95LMPHwQ134JxhKr","type":"Entry","createdAt":"2024-07-10T17:44:20.161Z","updatedAt":"2024-07-10T17:44:20.161Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/resources/articles/security/application-security-posture-management ","description":"Learn more about application security posture management for insights and explore best practices to increase protection against evolving cyber threats."}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"8cpgkmneHHbdV2eAlVkgh","type":"Entry","createdAt":"2024-07-11T14:41:35.361Z","updatedAt":"2024-07-11T14:41:35.361Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is threat modeling?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Threat modeling is a structured process that identifies security threats across systems during the design and planning phases of software production.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"69EibalzHbLKlAqlCdsWdn"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"kZnxKnOXoK3K4Zd9Es6uV","type":"Entry","createdAt":"2024-07-11T14:24:08.263Z","updatedAt":"2024-07-11T14:24:08.263Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is fuzzing and fuzz testing?","excerpt":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Discover vulnerabilities and enhance software security with fuzzing. Learn techniques, tools, and best practices for fuzz testing in software development.","marks":[],"data":{}}]}]},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"12PvPAvYTL5rc0ZCE0Diif"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"sqKS1UivZKfbmBaOUw44F","type":"Entry","createdAt":"2024-07-10T18:33:57.292Z","updatedAt":"2024-07-10T18:33:57.292Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"What is runtime application self-protection (RASP)?","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn how runtime application self-protection (RASP) protects software against attacks with real-time detection & prevention for application security.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"12PvPAvYTL5rc0ZCE0Diif"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"t6V7QaZcvTk0W10BEh56e","type":"Entry","createdAt":"2024-06-25T02:17:11.331Z","updatedAt":"2024-06-25T02:17:11.331Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateResourcesArticle"}},"locale":"en-US"},"fields":{"title":"Application security testing","excerpt":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover the importance of application security testing (AST) to ensure the security of your applications. Learn about common types of attacks and vulnerabilities, the role of security testing tools, and best practices for implementing AST in your organization.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"heroBackgroundImage":{"sys":{"type":"Link","linkType":"Entry","id":"5jk9xlzqocl157dfwxzbrV"}}}}],"Asset":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2xk9Ss2Xsd19aHioDXJvam","type":"Asset","createdAt":"2024-06-25T02:29:34.623Z","updatedAt":"2024-06-25T02:29:34.623Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-LightMode-2","file":{"url":"//images.ctfassets.net/8aevphvgewt8/2xk9Ss2Xsd19aHioDXJvam/48f8d1580007383c424ee3379e30d8a3/Security-LightMode-2.png","details":{"size":476378,"image":{"width":1200,"height":630}},"fileName":"Security-LightMode-2.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6iqN6327Tz9zouhZu7Ow74","type":"Asset","createdAt":"2024-06-25T02:31:15.388Z","updatedAt":"2024-06-25T02:31:15.388Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-DarkMode-2 1","file":{"url":"//images.ctfassets.net/8aevphvgewt8/6iqN6327Tz9zouhZu7Ow74/c290fdc8b53efcc7ce45fb760feea4b3/Security-DarkMode-2_1.png","details":{"size":93550,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-2_1.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7ETOYx5RKOqnELEHUOZDLa","type":"Asset","createdAt":"2024-07-10T17:57:52.235Z","updatedAt":"2024-07-10T17:57:52.235Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-LightMode-1","file":{"url":"//images.ctfassets.net/8aevphvgewt8/7ETOYx5RKOqnELEHUOZDLa/411bdcc3ff038ff634c8ee060b727c08/Security-LightMode-1.png","details":{"size":105000,"image":{"width":1200,"height":630}},"fileName":"Security-LightMode-1.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"WNgDKEiygdGk22WgaD2TE","type":"Asset","createdAt":"2024-06-24T18:11:33.816Z","updatedAt":"2024-06-24T18:11:33.816Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-DarkMode-1 1","file":{"url":"//images.ctfassets.net/8aevphvgewt8/WNgDKEiygdGk22WgaD2TE/784cf9cc67b019165932538e454ff092/Security-DarkMode-1_1.png","details":{"size":93322,"image":{"width":1200,"height":630}},"fileName":"Security-DarkMode-1_1.png","contentType":"image/png"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"ZDIT3ae5vdcud13spe9RW","type":"Asset","createdAt":"2024-07-11T14:41:35.175Z","updatedAt":"2024-07-11T14:41:35.175Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Security-LightMode-3","file":{"url":"//images.ctfassets.net/8aevphvgewt8/ZDIT3ae5vdcud13spe9RW/5b02b386bbf886ed2d95ce197a2d1909/Security-LightMode-3.png","details":{"size":407759,"image":{"width":1200,"height":630}},"fileName":"Security-LightMode-3.png","contentType":"image/png"}}}]}},"userLoggedIn":false,"additionalProps":{"pageHeading":"Security","page":1,"totalPages":1}},"title":"Security"}