News
Threat Modeling: It’s not Just for IT Anymore
There was a time, not too long ago, when the only things connected to IT networks were IT devices. You know, computers and such. But that’s not true...
DevSecOps Engineer: An Emerging Cybersecurity Career Path
With more and more organizations relying on cloud-based tools to fuel their digital transformation projects and drive future growth, quickly...
DevSecOps and the Evolution of Threat Modeling
Threat modeling has become an integral part of the software development process, providing developers with an opportunity to identify security...
How to create and manage a rock-solid DevSecOps framework
Security has long been treated as an afterthought in software development. Developers work to create effective code but only consider software...
A New Type of Cryptomining Attack Aims to Hijack Network Bandwidth
Researchers on Tuesday found a new type of crypto-mining attack in the wild that’s designed to hijack network bandwidth. Read the full article here...
How the Rise of ‘Purple Teams’ Can Impact Your Cybersecurity Career
For years, security-conscious organizations invested in Red teams and Blue teams to help shore up their cyber defenses. While Red teamers focused on...
DevSecOps and the importance of threat modeling [Q&A]
In the past security has been something that was added only at the end of the development process. But as release cycles have accelerated this is no...
Security Pros Lured to Bug Bounties by Big Pay Days
As criminal activity on the internet continues to accelerate, bug hunting for cash has begun to attract more and more security researchers. Read the...
Security Pros Lured to Bug Bounties by Big Pay Days
As criminal activity on the internet continues to accelerate, bug hunting for cash has begun to attract more and more security researchers. Read the...