Blog

Some description for category

4 Tips to Maximize Application Pentest Value

Some interesting insights on how to get the most of your pentest: from selecting the right vendor to proper project management.

Shift-Left Security: The Basics of Threat Modeling

Basics of the trendy shift-left security approach and specifically focusing on one extremely useful practise – threat modeling.