The upcoming Cyber Resilience Act (CRA) is a EU regulation that was published on November […]
Many organizations treat Common Vulnerabilities and Exposures (CVEs) as first-class citizens. Some even enforce strict[…]
Application security (AppSec) remains one of the toughest challenges modern organizations are facing. Despite heavy[…]
About 4 years ago I have joined the OWASP Software Assurance Maturity Model (SAMM) project[…]
In this technical article, we will explore how to improve your DevSecOps processes by integrating[…]
Dependency management has become one of the most critical aspects of modern software development. Third-party[…]
You’ve probably heard the saying, “You can’t manage what you don’t measure.” If you are[…]
Threat modeling shaped my AppSec career. It helped me wrestle with one of security’s most[…]
Introduction In this blog, we will focus on helping you understand what is Cybersecurity Fundamentals[…]
Dear disgruntled employee (let’s call you Mallory): Tired of working long hours with no holidays,[…]
The terms information security and cybersecurity are often used interchangeably, which frequently leads to confusion.[…]
The U.S. cybersecurity strategy seems to be lightyears ahead of the EU. I strongly believe[…]











