Filter & Sort
  1. Rails debug mode enabled

    Uncover the critical security risks of running Ruby on Rails in development mode on a live server, from exposing internal workings and sensitive information to increasing the risk of remote code execution and DoS attacks. Learn practical steps to safeguard your application and prevent these vulnerabilities.

  2. How to store and secure sensitive data in web applications

    Given the surge in web application data breaches, learn how to effectively store and secure sensitive data in your web applications. This article explores critical data types, client-side and server-side storage mechanisms, common OWASP Top 10 vulnerabilities, and essential protective measures like robust authentication, access control, and encryption strategies.

  3. Master API security: Securing your entire API ecosystem with Beagle Security’s API discovery

    Discover how unchecked API sprawl creates critical security blind spots for fast-growing fintech startups, leading to data breaches and operational inefficiencies. Learn how Beagle Security's API discovery feature automatically uncovers and tests all APIs within Kubernetes or Istio environments, ensuring complete visibility and proactive vulnerability management.

  4. How much does pen testing cost (2025)

    Explore the true costs of penetration testing in 2025, breaking down pricing by scope (web, mobile, API, cloud, network, IoT) and methodology (black box, grey box, white box). Discover key factors influencing costs and learn how AI-powered solutions like Beagle Security offer a faster, more affordable alternative to traditional pen tests.

  5. AI is Writing Your Code—Who’s Keeping It Secure

    AI code is the new Shadow IT, and it's already everywhere. Discover why AI-generated code is a rising security risk and get a brass-tacks guide for CISOs and security leaders to implement a layered strategy, combining governance and technical controls—with tools like Checkmarx One—to secure code at the speed of AI.

  6. What’s ‘Boardish’ and Why You Should Learn to Speak It Fluently

    CISOs, stop speaking jargon! Discover why mastering 'Boardish' – the language of business impact and financial ROI – is crucial for cybersecurity leaders. Learn how to bridge the communication gap with your board, overcome biases, secure budget buy-in, and elevate security from a cost center to a strategic business partner.

  7. ASPM is for Everyone

    ASPM isn't just for security teams anymore! Discover why developers are the new frontline in AppSec and how Checkmarx is bringing powerful Application Security Posture Management (ASPM) directly into their IDEs, unifying insights and focusing on exploitable risks for friction-free, AI-powered security.

  8. Overriding variables in Terraform

    Sometimes, overriding variables in Terraform is needed for testing or using code outside its intended usage patterns. This article shows you how.

  9. Get the evil out – don’t run containers as root

    When containers entered the stage, by default they ran as root. This poses a security risk. Get the evil out - don't run containers as root.

  10. 6 ways available to address interoperability challenges across software systems

    Discover the six essential tools available to tackle interoperability challenges across industries in our latest blog post. 

  11. Expressions in Terraform

    Expressions are one of the most powerful features of any programming language and Terraform is no expection. Version 0.12 added more powerful features.

  12. Practical advise for DevSecOps, its just DevOps with strings attached

    With the rise in interest in security, the DevOps world is looking to integrate security into their processes. Here's how you DevSecOps.

Items 1 to 12 of 174 total

Show per page