Attend the CyberRisk Summit – for free: Join us May 23 to learn how cyber experts put vulnerability risk in context | Register >>

Vulnerability management metrics: The key metrics that will help you achieve successful cyber risk management | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

Attend the CyberRisk Summit – for free: Join us May 23 to learn how cyber experts put vulnerability risk in context | Register >>

Vulnerability management metrics: The key metrics that will help you achieve successful cyber risk management | Read more >>

CVE-2023-32784 in KeePass: How to fix the KeePass password manager vulnerability | Read more >>

TRY VULCAN FREE

Secure coding practices: the developer’s guide to security

Cyber risk is a major concern in any modern organization, with cyberattacks affecting even the biggest tech companies. Teams need to be better equipped to counter that risk and need to pull together in the direction of reducing it. For developers, that means secure coding – working from the outset to apply cyber security best… Continue reading Secure coding practices: the developer’s guide to security

App security prioritization: the top inputs

With the demand for high-performing, user-friendly applications at an all-time high, developers are now using different programming languages to gain a competitive edge. The downside, however, is that this can lead to app security issues, which are often overlooked. But security is also a key factor when it comes to your application’s success. A securely… Continue reading App security prioritization: the top inputs

SDLC and secure coding practices: the ultimate guide

As the threat landscape grows and the costs of data breaches increase, organizations are looking to adopt secure software development lifecycle (SDLC) best practices and methodologies. Secure SDLC is a multi-step approach that comprises a set of rules, procedures, and standards that govern the secure software development processes within your organization, focusing on the integration… Continue reading SDLC and secure coding practices: the ultimate guide