Sal JanssenDo you know your SOC blindspots?Knowing what assets are not being ingested into a Security Operations Center (SOC) may be even more crucial than knowing what is being…Dec 18, 2023Dec 18, 2023
Sal JanssenProdSec API Performance OptimisationOptimising API performance for product security applications involves a combination of strategies.Oct 20, 2023Oct 20, 2023
Sal JanssenProduct Security SWOT analysisWhen assessing Product Security, it is invaluable to look at a solution from all sides of a SWOT analysis (Strengths, Weaknesses…Oct 18, 2023Oct 18, 2023
Sal JanssenThe importance of SAST and SCA in your ProdSec PlatformIn the rapidly evolving world of software development, ensuring the security of your products is paramount. Two critical components of a…Oct 17, 2023Oct 17, 2023
Sal JanssenProduct Security Vendor SelectionWhen selecting a product security vendor, here are the main features to look for:Oct 15, 2023Oct 15, 2023
Sal JanssenThe value of a SaaS Product Security platform vs OnPremIn the digital age, the security of software products is paramount. Businesses have two main options for their security platforms: Software…Oct 14, 2023Oct 14, 2023
Sal JanssenEnhancing ProductSec with efficient SRE practicesSite Reliability Engineering (SRE) is a discipline that applies software engineering principles to operations problems. The main goal of…Sep 26, 2023Sep 26, 2023
Sal JanssenProductSec Increases Developer VelocityIn the fast-paced world of software development, speed and efficiency are key. A Software as a Service (SaaS) product security platform…Sep 20, 2023Sep 20, 2023
Sal JanssenThe importance of AppSec security log retainment for root cause analysisRetaining logs is a critical component of any successful cybersecurity strategy. Log retention refers to the archiving of event logs…Sep 4, 2023Sep 4, 2023