
Felipe Ruiz
Towards enhanced vulnerability prioritization
In this blog post, you will learn about reachability analysis, a software assessment technique that helps to prioritize vulnerabilities for their remediation.

Felipe Ruiz
How can we justify the investment in cybersecurity?
While it can be a difficult task because cybersecurity often does not bring tangible benefits, here are some ideas that help justify investing in it.

Jason Chavarría
Five best practices for coding with the help of gen AI
Generative AI tools are an ally for developers to write code efficiently. We share five best practices for developing software securely while using those tools.

Jason Chavarría
Importance, types, steps, tools of pentesting, and more
Explore the world of penetration testing and gain understanding of how it bolsters your cybersecurity safeguards against emerging threats.

Jason Chavarría
Impacts of false positives by security software
Losing time on false positives lowers devs' morale, costs money and prevents security teams from responding to real risks. We give details and recommendations.

Jason Chavarría
Learn the types, tools, techniques, principles and more
We define security testing and tell you all the basics. These include how to perform it to find vulnerabilities in software applications and other systems.

Felipe Ruiz
Towards an approach that engages more than SCA and SBOM
Understand what a comprehensive software supply chain security approach should aim at and why it is crucial to implement it during your company's SDLCs.

Felipe Ruiz
Description and critique of CEH certifications
Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Felipe Ruiz
Recognize the value of this security assessment method
We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.