5 Use Cases of Kondukto CLI in CI/CD pipelinesEveryone talks about integrating security with DevOps pipelines these days. However, in the pipelines, there are a plethora of scenarios…Jan 24, 2022Jan 24, 2022
Vulnerability Management In Your GitFlowAs most organizations are trying to bake security into their SDLC and with the wide adoption of git-flow, security concerns are also taking…Oct 18, 2021Oct 18, 2021
Published inNerd For TechThe Essence of DevSecOps: Aligning Multiple TeamsLet’s face it! Security teams are not capable of ensuring secure development life cycles themselves. They can only get the ball rolling but…May 15, 2021May 15, 2021
Published inStar GazersHow to Get the Most Out of Security Training ProgramsWe have all been involved in many training sessions in our careers. Sometimes willingly and sometimes not.Feb 26, 2021Feb 26, 2021
Published inThe Startup4 Key Benefits of Application Security Orchestration and Correlation (ASOC)In the modern software development life cycle, there is a variety of security tools used in different phases of development pipelines.Sep 30, 2020Sep 30, 2020
Cybersecurity As a Marketing ActivityCybersecurity has always been considered a technical issue. Undoubtedly it is. However, its affinity with marketing is most of the time…Aug 28, 2020Aug 28, 2020
Published inDev GeniusSoftware Developers : Scapegoats For Security VulnerabilitiesNowadays there is a wide variety of security layers used by organizations at different stages of the software development life cycle…Jun 24, 2020Jun 24, 2020
Published inDev Genius5 Circular Phases of Sec in DevSecOpsIn the ever-changing landscape of Appsec and DevOps, we have recently started to talk about shifting center instead of shifting left. This…Jun 4, 2020Jun 4, 2020
Published inDataDrivenInvestorDamage Limitation Strategies for DevelopersIn this post we will talk about some quick and easy software security mitigation tricks that every developer can use on a daily basis.Sep 4, 2019Sep 4, 2019
What Is the Benefit of Automating Issue Opening Process In Vulnerability Management ?If the title of this post has attracted your attention and you have started to read it, you are probably aware of the fact that your…Jul 1, 2019Jul 1, 2019