<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>IAST on Sven Ruppert</title><link>https://sven-ruppert.info/tags/iast/</link><description>Recent content in IAST on Sven Ruppert</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>sven.ruppert@gmail.com (Sven Ruppert)</managingEditor><webMaster>sven.ruppert@gmail.com (Sven Ruppert)</webMaster><copyright>© 2026 Sven Ruppert</copyright><lastBuildDate>Mon, 19 Jul 2021 15:34:30 +0000</lastBuildDate><atom:link href="https://sven-ruppert.info/tags/iast/index.xml" rel="self" type="application/rss+xml"/><item><title>What is the difference between SAST, DAST, IAST and RASP?</title><link>https://sven-ruppert.info/posts/what-is-the-difference-between-sast-dast-iast-and-rasp/</link><pubDate>Mon, 19 Jul 2021 15:34:30 +0000</pubDate><author>sven.ruppert@gmail.com (Sven Ruppert)</author><guid>https://sven-ruppert.info/posts/what-is-the-difference-between-sast-dast-iast-and-rasp/</guid><description>&lt;p&gt;&lt;a href="https://open.spotify.com/show/0rZHMLs9fWq1G0Q2DAQbc3" target="_blank" rel="noreferrer"&gt;&lt;figure&gt;&lt;img
 class="my-0 rounded-md"
 loading="lazy"
 decoding="async"
 fetchpriority="low"
 alt=""
 src="https://sven-ruppert.info/images/spotify-badge.svg"
 &gt;&lt;/figure&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Intro:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In this post, we&amp;rsquo;re going to look at the differences between the various cybersecurity defence techniques. Here you can identify four main groups, which we will go through briefly one after another to illustrate the advantages and disadvantages.&lt;/p&gt;</description></item></channel></rss>