Filter & Sort
  1. The ten pillars of pragmatic deployments

    Unlock the secrets to flawless software delivery! Explore the "10 Pillars of Pragmatic Deployments" that ensure repeatability, visibility, and auditability. Learn how to master rolling forward, standardize processes, and coordinate releases for robust, high-performing software pipelines.

  2. Stack Overflow Uses Config as Code in Octopus for its Enterprise Solution

    Stack Overflow adopted Octopus Deploy to streamline and scale its enterprise software delivery using tenanted deployments, automation, and Configuration as Code. By integrating application code, build, and deployment processes in a single GitHub repo, the team improved CI/CD efficiency, enabled better collaboration through pull requests, and reduced deployment times across multiple customers. Octopus's Azure support, API flexibility, and excellent customer service empowered Stack Overflow to standardize and mature its DevOps practices.

  3. Five Reasons Standalone Vulnerability Scanning Isn’t Enough in 2025

    Vulnerability scanning alone doesn’t cut it anymore. While it’s long been a core security practice, scanning tools can’t tell you which vulnerabilities are exploitable, how attackers would target them, or which ones pose real risk. This article explores the limitations of vulnerability scanning, the shortfalls of traditional vulnerability management, and why organizations must adopt a risk-based, context-driven approach to application security. Learn how to prioritize based on exploitability, integrate security across the SDLC, and move toward continuous, intelligent threat detection.

  4. Workload Identity Meets Supply Chain Security: Teleport's Sigstore Integration

    Modern software supply chains face increasing complexity and risk, especially from supply chain attacks like SUNBURST. This article explores how Sigstore and Teleport's Machine & Workload Identity can fortify your CI/CD pipeline. Learn how Sigstore enables keyless, verifiable artifact signing, and how Teleport integrates these signatures into workload attestation using SPIFFE-based SVIDs. Discover how to enforce policies that block compromised containers from accessing sensitive resources, and how cryptographic identity can replace static secrets for secure service-to-service communication. A must-read for DevSecOps teams aiming to embed security into the development lifecycle.

  5. How to store and secure sensitive data in web applications

    Given the surge in web application data breaches, learn how to effectively store and secure sensitive data in your web applications. This article explores critical data types, client-side and server-side storage mechanisms, common OWASP Top 10 vulnerabilities, and essential protective measures like robust authentication, access control, and encryption strategies.

  6. Master API security: Securing your entire API ecosystem with Beagle Security’s API discovery

    Discover how unchecked API sprawl creates critical security blind spots for fast-growing fintech startups, leading to data breaches and operational inefficiencies. Learn how Beagle Security's API discovery feature automatically uncovers and tests all APIs within Kubernetes or Istio environments, ensuring complete visibility and proactive vulnerability management.

  7. How much does pen testing cost (2025)

    Explore the true costs of penetration testing in 2025, breaking down pricing by scope (web, mobile, API, cloud, network, IoT) and methodology (black box, grey box, white box). Discover key factors influencing costs and learn how AI-powered solutions like Beagle Security offer a faster, more affordable alternative to traditional pen tests.

  8. AI is Writing Your Code—Who’s Keeping It Secure

    AI code is the new Shadow IT, and it's already everywhere. Discover why AI-generated code is a rising security risk and get a brass-tacks guide for CISOs and security leaders to implement a layered strategy, combining governance and technical controls—with tools like Checkmarx One—to secure code at the speed of AI.

  9. What’s ‘Boardish’ and Why You Should Learn to Speak It Fluently

    CISOs, stop speaking jargon! Discover why mastering 'Boardish' – the language of business impact and financial ROI – is crucial for cybersecurity leaders. Learn how to bridge the communication gap with your board, overcome biases, secure budget buy-in, and elevate security from a cost center to a strategic business partner.

  10. ASPM is for Everyone

    ASPM isn't just for security teams anymore! Discover why developers are the new frontline in AppSec and how Checkmarx is bringing powerful Application Security Posture Management (ASPM) directly into their IDEs, unifying insights and focusing on exploitable risks for friction-free, AI-powered security.

  11. API Security Testing: What it is, Why it Matters

    APIs power modern applications but also expose critical vulnerabilities that attackers often exploit. This article explores why API security testing is essential, how breaches like MOVEit happened, and what organizations can do to protect their APIs. It also highlights the differences between REST, SOAP, and GraphQL security, and how tools like OX Security help ensure complete visibility and protection across the API landscape.

  12. OX Security: Empowering Executives with Actionable AppSec Insights

    Application security isn’t just a technical concern — it’s a business priority. OX Security’s enhanced executive reports help bridge the gap between AppSec teams and leadership by turning complex security data into clear, actionable business insights. With high-level summaries, dynamic visualizations, and tailored risk analysis, these reports empower executives to prioritize security investments and align AppSec strategies with business goals.

Items 1 to 12 of 283 total

Show per page