Back to blog

DevSecOps

Subdomain takeover: 12 Ways to Prevent this Attack

Subdomain takeover: 12 Ways to Prevent this Attack

Subdomain takeovers don’t happen because attackers are geniuses. They happen because DNS records get messy. It’s not exactly an exciting gig to track old services or

Secure Your CI/CD Pipelines: 7 Best Practices You Can’t Ignore

Secure Your CI/CD Pipelines: 7 Best Practices You Can’t Ignore

What’s the difference between an unsupervised toddler with markers and an unsecured CI/CD pipeline? Both look fine at first, but chaos is inevitable. While a toddler

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What is the Salt Typhoon Hack and What Will it Mean for Cybersecurity?

What if your most personal chats, the very foundation of your digital existence, were exposed?  Unfortunately, that’s precisely what happened with the Salt Typhoon Hack on

8 Steps to Mitigate Supply Chain Risk in Cybersecurity

8 Steps to Mitigate Supply Chain Risk in Cybersecurity

You don’t control most of the code in your software. Unfortunately, that’s the reality of today. Open-source libraries, third-party components, and vendor integrations make up the

Top 10 Static Application Security Testing (SAST) Tools

Top 10 Static Application Security Testing (SAST) Tools in 2025

Updated October 21, 2024 Imagine you’re all prepared to roll out your latest feature, and suddenly, right before launch, you discover a security vulnerability concealed in

6 Threat Modeling Examples for DevSecOps

6 Threat Modeling Examples for DevSecOps

As organizations push the boundaries of innovation, the need to embed security into every layer of the development process has never been more pressing. DevSecOps—a practice

Static Code Analysis for Python: 7 features to look out for

Static Code Analysis for Python: 7 features to look out for

Python dominates the coding world, powering everything from web apps to AI breakthroughs.  It’s so popular that 70% of developers have Python in their toolkit. It’s

Software supply chain risk assessment: 8 steps to a secure SDLC

Software supply chain risk assessment: 8 steps to a secure SDLC

Like any chain, a software supply chain contains many links. These links consist of every actor involved in the development & deployment of your code in

SAST vs DAST: Which one do you really need?

SAST vs DAST: Which one do you really need?

Security testing? Ain’t nobody got time for that. Or budget. Or the necessary skills to align coding practices with organizational and regulatory compliance efforts. Developers are

Stop leaks at the source!