Skip to main content

Security series hub

Go for a security deep dive with a series below. Each series is broken into multiple articles, so you can come up for air whenever you want.

Artificial Intelligence

Learn about the different aspects of AI in cybersecurity and software development with our series exploring how to use AI in cybersecurity, the risks involved, and more.

Ethical Hacking

The need for ethical hacking has never been greater. As cyber threats become more sophisticated, organizations must take a proactive approach to cybersecurity, and ethical hacking is an essential component of any effective security strategy.

wordpress-sync/feature-series-aws-security-poster

AWS Security Misconfigs

Learn about the top 5 AWS security misconfiguration risks and how to fix them.

Open Source Security

Open source software has fueled digital transformation and development velocity. With its widespread adoption, it’s essential to manage vulnerable dependencies and mitigate risk. Learn why and how.

wordpress-sync/feature-ctf-challenge

Capture the Flag (CTF)

Learn everything you need to know to get started with Capture the Flag (CTF).

wordpress-sync/state-of-cloud-native-application-security-report-post

Cloud Security

Cloud computing has been widely adopted among organizations of all sizes thanks to the scalability, flexibility, and speed of deployment it allows. But whether deploying in a public or private cloud, organizations need to make cloud security a priority.

wordpress-sync/feature-executive-strategy

CISO

In this series, we’re going to explore the evolving role and responsibilities of the modern CISO.

Developer Adoption

Learn best practices for driving developer adoption of security tools and processes, as well as the development cultural shifts that come with them.

DevSecOps

DevSecOps refers to the integration of security practices into a DevOps software delivery model. Its foundation is a culture where development and operations are enabled through process and tooling to take part in a shared responsibility for delivering secure software.

Enterprise Security

Enterprise security procedures ensure the protection and integrity of valuable digital assets, allowing organizations to navigate the digital landscape confidently while mitigating risks and thwarting potential threats.

Security Champions

Security champions are developers with an interest in security and a home in development. They are the interface between two teams that have traditionally been siloed. Let’s take a look at some of the benefits any organization can gain from these programs.

Cloud Compliance

Cloud compliance is essential for securing your data in the cloud. In this series, we will explain what it is, why it matters, and how to achieve it with best practices and frameworks.

Supply Chain Security

Learn how to protect your software products and services from common threats and risks, such as dependency confusion, code injection and compromise, using best practices and tools for software supply chain security.

Zero-Day Vulnerabilities

Follow our series to learn about different zero-day vulnerabilities that have surfaced in recent years, and how to prepare your organization to respond to them effectively.