TECHNICAL Security as Code: Writing security requirements in Gherkin An easy DevSecOps methodology to inject security requirements inside an application's repository.
TECHNICAL Homegrown Cyber Threat Intelligence With STIX2 and Couchbase Threat intelligence is an important part of incident response and vulnerability management, in this article we show you how to create and archive threat intelligence, without paying vendors, using STIX and Couchbase.