Red teaming – 5 tips on how to do it safely
Tomasz Andrzej Nidecki | June 20, 2022 Red team vs blue team exercises are a very effective method to evaluate the security posture of your… Read More »Red teaming – 5 tips on how to do it safely
Tomasz Andrzej Nidecki | June 20, 2022 Red team vs blue team exercises are a very effective method to evaluate the security posture of your… Read More »Red teaming – 5 tips on how to do it safely
Tomasz Andrzej Nidecki | June 27, 2022 Every business knows that to maintain security, you need the primary pillar: the right employees. Some businesses know… Read More »Hackers: The third pillar of security
Meaghan McBee | May 9, 2022 What’s in a number? For DevSecOps professionals, the answer is “a lot.” Analytics in application security (AppSec) hold immense… Read More »Four ways AppSec analytics help your DevSecOps pros work smarter, not harder
Tomasz Andrzej Nidecki | May 16, 2022 The lack of cybersecurity talent is nothing new. It’s a problem that all businesses have been facing for… Read More »Four ways to combat the cybersecurity skills gap
Tomasz Andrzej Nidecki | May 23, 2022 DevSecOps stands for development, security, and operations. Similar to DevOps or SecOps, it is a concept that joins… Read More »What is DevSecOps and how should it work?
Nicholas Sciberras | May 24, 2022 A new Acunetix Premium update has been released for Windows, Linux, and macOS: 14.8.220519149. This Acunetix release introduces support… Read More »Acunetix releases IAST support for JBoss, Jetty and WildFly Java servers as well as Servlet 3 and Jersey Java frameworks
Tomasz Andrzej Nidecki | May 30, 2022 Businesses often perceive vulnerability scanning as an alternative to penetration testing. This perception is wrong. An organization conscious… Read More »Penetration testing vs vulnerability scanning
Kevin Beaver | June 6, 2022 It seems that most application security discussions revolve around initial vulnerability scanning and penetration testing. You’ve got to start… Read More »Considerations for web application remediation testing
Tomasz Andrzej Nidecki | June 13, 2022 Threat modeling is an activity that helps you identify and mitigate threats. It’s very important because it makes… Read More »Threat modeling for web application security
Tomasz Andrzej Nidecki | June 20, 2022 Red team vs blue team exercises are a very effective method to evaluate the security posture of your… Read More »Red teaming – 5 tips on how to do it safely