Welcome to our Blog
From software security to threat modeling to compliance & risk management frameworks (and everything inbetween). We've got it covered.
Featured Posts
Build a Cybersecurity Powerhouse: How to Launch a Successful Security Champion Program
Security Champions are like your cybersecurity sidekicks embedded in every department, making security a shared responsibility. They help you build a cybersecurity-conscious culture from within.
Read MoreLatest Posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
First International Workshop on Gender and Cybersecurity
Our Chief Operating Officer Cristina Bentue will participate in a round table at the First International Workshop on Gender and Cybersecurity.
Software Security
Use Case - Threat Modeling SaaS Applications
Do SaaS applications need to be threat modeled? Absolutely!
Risk Management
Software security
Threat Modeling