This article was originally published on GovDevSecOpsHub, that article can be found here. Today it is quite uncontroversial to say that the cloud is here and that it is not going anywhere anytime soon. Two years ago, this was a…
APIs and IaC – Two New AppSec Imperatives for Development and Security Teams
Application vulnerabilities are among the largest, most exploited vulnerabilities that hackers use to compromise and breach organizations. With applications becoming more prevalent and relied upon, the need to focus on application security becomes absolutely essential. But what many people don’t…