Image
SZ_Coding-Linux_476x210.jpg

October 03, 2023

Understanding API usage and profiles is key for an organization’s security maturity. Learn how to classify API usage, exposure, data and compliance.

Blog

Image
SZ_Software-development_476x210_Red.jpg

September 26, 2023

Software operations are a key part of determining software system security. Learn to leverage OWASP SAMM to maintain the security of deployed software....

Blog

Image
SZ_Hacker-Figure-At-Screen_476x210_Red

August 25, 2023

Adversaries can utilize native tools to remain undetected by defenders. See our demo of how red and blue teamers can enhance engagements with LOLBins.

Blog