2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise. Continue reading 2020 Cybersecurity Trends to Watch

Strategies to find software vulnerabilities: what are the categories? [closed]

In our team we are planning to start pro-actively find vulnerabilities in our legacy software products. Previously, we relied on user reports, but that is not a pro-active approach. We don’t have expert penetration testers in… Continue reading Strategies to find software vulnerabilities: what are the categories? [closed]

Why Application Flow Maps Are the Coolest Feature in Application Security

Application flow maps are the cool feature you can use to discover that needle in a haystack—how does my running app work and what does my app connect to?
The post Why Application Flow Maps Are the Coolest Feature in Application Security app… Continue reading Why Application Flow Maps Are the Coolest Feature in Application Security