HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a critical federal law […]
The U.S. cybersecurity strategy seems to be lightyears ahead of the EU. I strongly believe[…]
It this article we explore the essentials of the EU Cyber Resilience Act (CRA), and[…]
Starting a OWASP SAMM assessment journey can feel overwhelming. SAMM, short for Software Assurance Maturity[...]
In an increasingly digital world, the management and security of our personal information have become[…]
Threat modeling yields the highest return on investment when it comes to your Application Security[…]
The secure deployment of your software is a central piece in your secure software development[…]