Recommended blog posts
You might be interested in the following related posts.
Beware of insecure-by-default libraries!
Impacts of false positives by security software
Learn the types, tools, techniques, principles and more
Towards an approach that engages more than SCA and SBOM
What is invisible to some hackers is visible to others
Benefits and risks of these increasingly used programs
Description and critique of CEH certifications
Recognize the value of this security assessment method