The sources of vulnerabilities in any application, that your security program should address
An overview of the July 2023 to June 2024 period
An incident report about a compromised personal account
Securing systems with Team Topologies & Continuous Delivery
How to adapt a cybersecurity program to a modern tech organisation
Get rid of your us vs. them mentality