Navigating the Shift: Challenges in Shifting from DevOps to DevSecOps and How to Overcome TheseExplore the challenges faced by teams while transitioning from DevOps to DevSecOps and the strategies to overcome theseNov 27, 2024Nov 27, 2024
Advanced Strategies for SAST Scanning in CI/CD Pipelines in the Age of AIOptimising SAST scanning in CI/CD pipelines for greater security, agility, and developer productivityNov 17, 20242Nov 17, 20242
A Deep-dive on Exploit Prediction Scoring System (EPSS) — Part 1In today’s rapidly evolving cyber landscape, vulnerability management — a practice of identifying, prioritising, and remediating known…May 16, 2024May 16, 2024
Exploring CISA KEV: A Tool for Effective Vulnerability ManagementUnderstand how to take advantage of CISA KEV to strategically enhance your vulnerability management program.Apr 14, 20241Apr 14, 20241
Is NVD Dead? RIP NVD!The Inception and Evolution of NVD, Current Challenges, Future of NVD, and the Way Forward for the Cybersecurity Industry!Mar 30, 2024Mar 30, 2024
A Brief Overview of Common Vulnerabilities and Exposures (CVE)Learn about the importance of CVEs in Vulnerability Management, CVE Program organization, and the CVE generation process.Mar 22, 20241Mar 22, 20241
Top Cybersecurity NewslettersA compilation of top-tier cybersecurity newsletters providing regular updates on critical cybersecurity topics.Nov 25, 20232Nov 25, 20232
Is Software Supply Chain Security More Than Just Open-Source and SBOMs?If software supply chain security is not about open-source and SBOMs, what else is there to consider? In fact, a lot more!Nov 13, 2023Nov 13, 2023
Software Supply Chain Attacks — A CAPEC PerspectiveA comprehensive view of how the MITRE CAPEC framework organizes supply chain attack patterns within a robust and flexible three-tier…Oct 11, 2023Oct 11, 2023