As featured in:
Daily Briefing > V10 Issue 26
February 9, 2021
The CyberWire
John Petrik
Find out how our solution builds security and compliance into software.
Free Demo
Learn about the state of DevSecOps in 2021
Most Recent Articles

A conversation with Steven Patterson about his eBook, which teaches red team testing professionals how to start building Command and Control tools in C++.

In our survey, we found a rising trend toward the adoption of DevSecOps over the last year. Let's find out what are the biggest drivers and challenges with its implementation.

To stay secure while embracing the cloud, your organization will need a security program that takes into account the differences between cloud and traditional security.

2020 upended security strategies and IT roadmaps. Our team identified five cybersecurity trends that will influence security and business priorities moving ahead.

CMMC is a means of unifying cybersecurity standards for the U.S. Department of Defense. Learn how you can achieve compliance with this new standard.

Learn how penetration testing can help healthcare providers resist attacks from Ryuk Ransomware, keep patient records secure, and provide uninterrupted care.

Attackers are following the trajectory of software development and have their eyes on APIs. Regularly testing the security of your APIs reduces your risk.

Security testing has increased considerably over the past decade. But are vulnerability scanners enough to ensure software security?

Ask these five questions to find a penetration testing provider that both satisfies your technical needs and works in harmony with your business.

Moving applications from on-premise to SaaS brings a different set of risks. First among those is the fact that users data is stored in the SaaS provider's data center.

This Cybersecurity Awareness Month, take time to consider all the devices you have online. These 10 tips will help you create or strengthen your IoT security plan.

Businesses who conduct Red Team exercises have reduced costs when a data breach occurs.

Cloud adoption has gone mainstream. Taking full advantage of the benefits takes planning, skill, and a careful weighing of cloud security risks.

Securing a hybrid cloud environment can be challenging, but these best practices will help businesses minimize risk while taking advantage of the benefits.

Zero trust essentially involves changing the approach toward securing our systems and infrastructure. Read more to learn how you can prevent data breaches with this approach.

As more organizations adopt AWS services, penetration testing is critical for designing, securing, reviewing, and improving your cloud infrastructure.

Digital transformation is at the heart of the changing landscape in the insurance space, however, insurers must consider the risk implications of any change.

Our consulting team performed an evaluation of the Android version of Canada’s COVID alert app to evaluate data privacy and security concerns.

DevOps teams are always under tremendous pressure to release products faster while integrating security. How can they achieve these goals?