February 1, 2023
Get an overview of vulnerability assessment
Learn what vulnerability assessment is, why this IT systems evaluation process is important, what types exist, and how it relates to vulnerability management.
December 7, 2022
Disclosure rules proposed by SEC may soon take effect
We briefly present the amendments to cybersecurity-related disclosure rules proposed by the SEC, their potential benefits and costs, and some recommendations.
December 5, 2022
A simple approach to try out in cybersecurity training
We present a short review of a study in which the authors suggest an approach to introduce and encourage software developers to use secure coding practices.
November 30, 2022
Open the door to security as a quality requirement
Discover what is usually seen as code quality, why we believe this concept should include security and some recommendations to develop high-quality code.
November 25, 2022
Use of automated tools only? Don't stick to your guns!
In this blog post, we present some differences between automated and manual code reviews and emphasize the latter and the procedures performed by the reviewers.
November 22, 2022
And round it off with our Secure Code Review
Check out some best practices for secure coding your developers can start applying and how our Secure Code Review can complement them.
November 16, 2022
We adhere to the attack resistance management concept
This blog post explains the "attack surface management" and "attack resistance management" concepts and our transition from one to the other.
November 4, 2022
Threat landscape and preventive measures for next year
Thanks to this blog post, you will get an idea of possible threats and preventive measures that will take place in the cybersecurity context in 2023.
October 26, 2022
What is SCA, and what can we get from it?
After reading this blog post, you will understand what Software Composition Analysis (SCA) is and what we can obtain from SCA scans.