The upcoming Cyber Resilience Act (CRA) is a EU regulation that was published on November […]
The warning shots are over. The NIS 2 Directive is live, and enforcement has begun.[…]
As software systems grow more complex, proving that they are secure has become as important[…]
Most organizations conduct security assessments, yet few turn them into meaningful improvement. Traditional cybersecurity gap[…]
Automated Application Security Testing (AAST) refers to the use of software tools to identify vulnerabilities[…]
Many organizations treat Common Vulnerabilities and Exposures (CVEs) as first-class citizens. Some even enforce strict[…]
Developers are under pressure to deliver fast, but often without the tools to build securely.[…]
Application security (AppSec) remains one of the toughest challenges modern organizations are facing. Despite heavy[…]
Finding vulnerabilities is not the hard part anymore. Every build and every pipeline produces a[…]
By embracing the Japanese Kaizen philosophy of continuous incremental improvement, your AppSec program can evolve[…]
Your DevSecOps pipeline is fast, automated, and built to scale. But is security truly integrated,[…]
About 4 years ago I have joined the OWASP Software Assurance Maturity Model (SAMM) project[…]











