How to use OWASP SAMM for effective communication on security? Reporting with OWASP SAMM is […]
Application security is a paramount concern for organizations that develop software. However systematically managing AppSec[…]
Application security requires a systematic approach and requires dealing with software security throughout every stage[…]
For the past 20 years web applications have always been the number one action vector[…]
NIST has finalized the Cybersecurity Framework (CSF) 2.0. CSF 2.0 focuses on understanding, assessing, prioritising,[…]
Do you sell any software to any Federal Agency in the US? Then this blog[…]
Is SOC 2 Worth It? In this blogpost we will be discussing SOC 2, what[…]
What is a disaster recovery plan? A disaster recovery plan is your plan for when[…]
Is ISO 27001 worth it? In this blogpost we will be discussing ISO 27001. What[…]