PinnedZENcurityinTechnology Hits‘Tis the Season to Secure: How CVEs Are the Grinch for Cybersecurity🔒 (🎅Santa’s Alert for…Jingle Bells, Hackers Smell: Riding the CVE Sleigh to Cyber-Safe Holidays·8 min read·Dec 24, 2023----
PinnedZENcurityinTechnology HitsBon Appétit🍽️👩🍳👨🍳: An Introduction to CI/CD and DevSecOps With a Delicious Bakery Story🥖Exploring the World of CI/CD and DevSecOps through a Delicious Bakery Story·12 min read·Nov 28, 2023----
PinnedZENcurityinTechnology HitsMapping Risk to Cyber Threats, and Adopt Zero Trust by NIST’s CSFWith Other Cybersecurity Frameworks, CSF Can Help Enhance Organizational Cybersecurity Posture·6 min read·Mar 27, 2022--1--1
ZENcurityinTechnology HitsAdvancements in Vulnerability Assessment: The Shift from CVSS to EPSS and the Role of the MITRE…Evolving Vulnerability Assessment: The Journey from CVSS to EPSS·10 min read·6 days ago----
ZENcurityinTechnology HitsEvaluating the Impact of CISA’s Secure Software Development Attestation on Government Software…Bolstering Software Security: How CISA’s Attestation Protocol Impacts Government Software Development·3 min read·Apr 16, 2024----
ZENcurityinTechnology HitsThe Evolution of DevSecOps: Strengthening Software Security with Shift Left and Shift Right in the…Making Software Development Secure and Efficient with DevSecOps🚀·6 min read·Feb 27, 2024----
ZENcurityinTechnology HitsMastering Cloud Security: The Pivotal Role of Platform EngineeringReal-World Successes and Transformative Impacts✨🌍🚀·5 min read·Feb 20, 2024----
ZENcurityinTechnology Hits🔐 Unveiling a New Epoch in Cloud Security: Integrating MITRE, Shift Left, and CNAPP 🌐Embracing a New Paradigm in Cloud Security Governance·8 min read·Feb 14, 2024----
ZENcurityinTechnology HitsPerfecting the Recipe for Robust Cloud Applications: The Barista’s Approach to Shift-Left Security…The Art of Securing Cloud Applications: A Barista’s Guide ☁️🔒·12 min read·Jan 24, 2024----
ZENcurityinTechnology Hits🛡️ Fortifying The Matrix: Battling the Invisible Cyber Agents in Our Software Supply Chain 🕵️♂️Defending the Digital Matrix: Securing the Software Supply Chain with Cybersecurity Measures 🛡️🌐·10 min read·Jan 9, 2024--1--1