There’s More to Fixing a Data Breach than Patching the Hole
The Exploit Chain Problem: Why Attackers Always Find a Way
Human Error is Inevitable—But Java Security Breaches Aren’t
How to Prevent Ransomware Attacks in High-Tech Applications
No More Downtime for Financial DevOps Teams
Love and Cybersecurity and Basketball: Protecting the Paint in Application Security
The Healthcare CISO’s Guide to Aligning Security with ROI Goals
Oracle Critical Patch Update Analysis – January 2025
Protecting Financial Applications from SQL Injection Attacks
Neutralizing Apache Tomcat CVE-2024-56337 and CVE-2024-50379
Home Alone: Keeping Applications Safe While You’re Out of Office
“We Don’t Negotiate with Terrorists”: Ransomware Strategy in Cybersecurity