Все публикации

Common Pitfalls of Cloud Security w/ Michael Tayo (U.S. Bank) & Parveen Singh

How to Steal Unencrypted Data

Bionic Events Dashboard

Bionic + ServiceNow

How to Build an Application Inventory with Bionic

Billy the Bionic Bulldog

How to Build an OWASP Chapter w/ Jeremiah Salamon & Tony Quadros

How to Build an Application Inventory with Bionic

CI/CD Killed the Manual Code Review w/ Sean Wright, Principal App Security Engineer at Featurespace

How ASPM Can Help You Measure Security in Production #cybersecurity

Different States of Data #cybersecurity

Who is Measuring Security in Production

Where Does ASPM Fit? #cybersecurity

ASPM vs CSPM #cybersecurity

Innovation Insight for Application Security Posture Management #cybersecurity

Twitter Hack: How to Scrape Sensitive Data

Peloton Hack: How Unsecured APIs Leak Customer Data #cybersecurity

Security's Return on Investment #cybersecurity

Risk Scoring w/ ASPM #cybersecurity

Risk Scoring in Microservice Applications #cybersecurity

How ASPM Helps w/ Data Privacy & Security #cybersecurity

How ASPM Helps w/ Cross Environment Contamination #cybersecurity

What is Cross-Environment Contamination #cybersecurity

What is Cryptography? #cybersecurity