June 2017: Top Hacks and Breaches [INFOGRAPHIC]

As we dive into June’s biggest hacks and breaches, we begin with OneLogin – a company which allows users to access multiple websites, applications, and services with just a single password. An attacker got hold of highly-sensitive keys for OneLogin’s cloud instance, and successfully in using its front-door key. In a statement released by the

Read More »

An A to Z Guide to Continuous Integration

The race to improve software quality and innovation has been around since the 1970s. Many processes and workflows have been created to help address the historical issues that prevent teams from developing high-quality applications quickly and reliably, yet enterprises continue their struggle to keep up.  

Read More »

The ABCs of AppSec Testing: IAST & SAST

With cybercrime on the rise, application security remains a massive challenge for organizations and governments across the globe. When it comes to the safety of applications, Penetration Testing (Pen Testing) and Dynamic Application Security Testing (DAST) both remain standing as capable solutions, but both come with a fair share of inherited weaknesses which raise significant

Read More »

How to Raise Cybersecurity Awareness at all Levels of Your Organization

We’ve said it once and we’ll say it again: an organization is only as secure as its weakest link. Most, if not all, of your employees are online and on their mobile devices in your workplace, whether you have a BYOD policy in place or not. Developers release software with millions of lines of code,

Read More »

Why Your Enterprise Needs DevOps

The buzzword of the decade is far from just a trend as organizations struggle to keep up with competition. There’s a reason DevOps is so often discussed and highly regarded. As organization after organization makes the switch and reaps the rewards offered by the DevOps culture, it’s time for all those who could enjoy DevOps

Read More »