
XDR vs SIEM
XDR versus SIEM When designing a security infrastructure, many acronyms need to be addressed, and it can be difficult to find a…

Metlo API Security Platform
API security can be daunting, but we’re here to help. Introducing Metlo, the API Security Platform that helps you secure your API…

Can you keep a Secret? Secrets Management Done Right
Introduction Are you managing your secrets well or have you already been breached? Stolen credentials cause almost half of all data breaches…

Get the Squeeze on OWASP Juice Shop
Ever wanted to see the simple concepts hackers use to break into your web application, even without a technical background? In this…

Destroy your Development Environments
A practical example of why we should dispose of development environments when not in use and what can happen when an environment…

Git Robbing and OSINT
Open Source Intelligence (OSINT) is a large and extremely dangerous attack vector. It can often be difficult to monitor, as the product…

Making Security Relevant in the Cloud with DataDog
A look at an open source tool from DataDog that looks to visualise a system’s Security Posture and remediate any gaps found…