Industry Blog

A Review of the 2021 CISA and MITRE Vulnerability Lists
DEF CON 29 Recap: 9 Talks You May Have Missed
10 DEF CON 29 Security Talks to Watch
9 Post-Exploitation Tools for Your Next Penetration Test
Spark Your Curiosity With These Security Podcasts
Free Tools and Add-Ons to Explore for Applying DevSecOps in Your Organization
Our Position on the Digital Millennium Copyright Act (DMCA) and the Need to Safeguard Tools for Responsible Security Researchers
Why You Need Continuous Testing to Detect Emerging Threats and Discover the Unknowns
Applying DevSecOps in Your Organization
New Insights on Supply Chain and Ransomware Attacks From Our Chat With Alex Stamos and Charles Carmakal