What is FISMA and why is it important? The Federal Information Security Modernization Act (FISMA) […]
Managing cybersecurity risks requires a clear strategy combining people, processes, tools, and knowledge, all guided[…]
OWASP Software Assurance Maturity Model (SAMM) is one of the only comprehensive frameworks available for[…]
What is supplier risk management about? Outsourcing software development has become a cornerstone for many[…]
Introduction to software security requirements Despite clearly understanding the importance of security requirements, organizations seem[…]
The OWASP Software Assurance Maturity Model (SAMM) is rapidly becoming the go-to framework for application[…]
Cybersecurity in general and application security (AppSec) in particular are extremely challenging topics. They run[…]
It this article we explore the essentials of the EU Cyber Resilience Act (CRA), and[…]
Want to get started with SAMM? We have just the thing! Take the free OWASP[…]
How to use OWASP SAMM for effective communication on security? Reporting with OWASP SAMM is[…]
Application security is a paramount concern for organizations that develop software. However systematically managing AppSec[…]
Application security requires a systematic approach and requires dealing with software security throughout every stage[…]








