WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper
WHITE PAPER
Secure the agentic shift and bridge the AI readiness gap with the Responsible AI Imperative white paper

Cybersecurity Insights (17)

A Manager’s Guide to Selecting the Best Testing Approach for Your Application Security Needs

March 14, 2019
Est Read Time: 9 min
Security testing has emerged as a common best practice among application security programs of all types and sizes. The...
Cybersecurity Insights

3 things you should be doing when you pentest an Android application

January 18, 2019
Est Read Time: 2 min
To perform a pentest on an android application there are three important things that should be done by the pentester.
Cybersecurity Insights Mobile Application Pentesting

Pentesting in the Era of APIs and Microservices

May 31, 2018
Est Read Time: 2 min
Cybersecurity Insights API Pentesting

Humans of InfoSec: A New Security Podcast

April 5, 2018
Est Read Time: 2 min
https://soundcloud.com/humans-of-infosec
Cybersecurity Insights

Vendor Security Questionnaires: The Buyer’s Perspective

December 4, 2017
Est Read Time: 6 min
Tips on vendor assessments from experts in the industry
Cybersecurity Insights

How to Survive a Vendor Security Questionnaire

August 14, 2017
Est Read Time: 7 min
Tips on vendor assessments from experts in the industry
Cybersecurity Insights

Start at Zero with the OWASP Top 10

April 24, 2017
Est Read Time: 3 min
Engineering is an exercise in working within constraints. Appsec increases those constraints, forcing developers to...
Cybersecurity Insights

The Third Wave of Application Security

January 26, 2017
Est Read Time: 8 min
Cybersecurity Insights

Integrating Crowdsourced Information Security into Agile SDLC

November 28, 2016
Est Read Time: 4 min
Keeping the balance between information security assurance and business goals has always presented itself as a big...
Cybersecurity Insights Agile Pentesting