Have you every been hacked? It sucks right? But don’t worry—now, let’s make sure it […]
In today’s rapidly evolving digital landscape, ensuring software security is more critical than ever. Recognizing[…]
HIPAA, the Health Insurance Portability and Accountability Act of 1996, is a critical federal law[…]
The U.S. cybersecurity strategy seems to be lightyears ahead of the EU. I strongly believe[…]
Application security is a complex discipline. To make things even harder for us, it is[…]
It this article we explore the essentials of the EU Cyber Resilience Act (CRA), and[…]
How to use OWASP SAMM for effective communication on security? Reporting with OWASP SAMM is[…]
For the past 20 years web applications have always been the number one action vector[…]
NIST has finalized the Cybersecurity Framework (CSF) 2.0. CSF 2.0 focuses on understanding, assessing, prioritising,[…]