PinnedPublished inbetter appsecOne Vulnerability at a Time: How to Run High-Impact AppSec CampaignsA guide to dealing with the data from security processes, so Application Security teams can mobilize Developers and truly show their value.Aug 14Aug 14
PinnedPublished inbetter appsecA Dive into Web Application AuthenticationA closer look into Web Application Authentication and what it means at a basic level for consumers and businesses.Oct 31, 2022Oct 31, 2022
PinnedPublished inbetter appsecHow Automated AI Code Analysis Can Scale Application SecurityA look at how Generative Artificial Intelligence (Gen AI) tools can help scale an Application Security (AppSec) Engineer’s workflow.Oct 19, 2023A response icon4Oct 19, 2023A response icon4
PinnedPublished inbetter appsecHow to Achieve Application & Cloud Security ResilienceA guide to defining and maturing a truly resilient Application and Cloud Security program through automation and data.Oct 5, 2023A response icon2Oct 5, 2023A response icon2
PinnedPublished inbetter appsecCISO’s Guide to a Modern AppSec ProgramA guide for CISOs and security leaders to enable a business with Application Security and a shift left approach.Oct 5, 2023Oct 5, 2023
Published inbetter appsecThe Future of Application Security Testing (AST)How AI and LLMs are changing Application Security (AppSec) products, such as SAST and DAST, to improve software quality.Mar 21Mar 21
Published inbetter appsecMaking Sense of the Application Security Product MarketA practitioner’s perspective on how the Application Security (AppSec) Product market is changing.Aug 22, 2024Aug 22, 2024
Published inbetter appsecHow AI is Helping Cybersecurity ScaleA look at how Artificial Intelligence (AI) products and features are driving scale for both Application Security (AppSec) and Cyber.Jun 6, 2024A response icon1Jun 6, 2024A response icon1
Published inbetter appsecHow to Build a Cloud Native Data Security ProgramA guide on how to achieve cloud & application security data protection and maturity in a cloud native way.Mar 21, 2024Mar 21, 2024
Published inbetter appsecMastering Vulnerability Elimination Starts With The BasicsFrom detect to protect: an overview of how to eliminate vulnerabilities from your Application and Cloud security Programs.Feb 15, 2024A response icon1Feb 15, 2024A response icon1