Second wave of Shai-Hulud npm worm compromises the global software supply chain
An abundance of caution: Why the curl buffer overflow is not the next Log4Shell
Get Management Buy-in with AppSec Metrics
Rapid Reset HTTP/2 vulnerability: When streaming leads to flooding
Top 5 application security misconfigurations
Hacking the hackers: Borrowing good habits from bad actors
How to Streamline Vulnerability Management
NIST Cybersecurity Framework gets user-friendly: Upcoming changes in CSF v2.0
Surviving the API apocalypse: How to defeat zombie APIs