What we do
How we do it
Resources
Resource Hub
Blog
Change Analysis Tool
Book a Demo
Log In
Book a Demo
Log In
Vulnerability Management
Top 5 Business Logic Flaws and Why You Need To Know About Them
Discover a round up of the top 5 business logic flaws that organisations are commonly facing and how they can harm your application’s security.
Thomas Ballin
11 minutes
Vulnerability Management
Business Logic Flaws in Application Security
Everything you need to know on business logic flaw vulnerabilities.
Thomas Ballin
4 minute read
Security Testing
Automated vs Manual Security Testing - How to Choose the Best Test at Scale
Create an automated list of testing actions to scale your security testing programme.
Thomas Ballin
4 minute read
Security Testing
LLM Assisted Security Testing - Use Case
Explore a real example of how an LLM identified a vulnerability missed by automated and manual testing.
Thomas Ballin
8 minute read
Cytix
Turning Development Data Into Testing Actions - A Deeper Look Into the Intelligence Engine
Deeper exploration of Cytix feature, the Intelligence Engine.
Thomas Ballin
4 minute read
Security Testing
Creating an Effective Security Testing Strategy
Focus on these 6 key areas to build an effective security testing strategy.
Thomas Ballin
5 minute read
Vulnerability Management
How are companies addressing vulnerability backlogs?
Vulnerability backlogs are commonly dealt with in these three approaches. But what are they missing?
Thomas Ballin
3 minute read
AI
How does ChatGPT affect Cyber Security
Is ChatGPT beneficial for Cybersecurity? Explore the pros and cons in this 3-minute blog.
Thomas Ballin
3 minute read
Security Testing
How to work out MTTD (Mean Time to Detection)?
Understanding the mean time to detection of a vulnerability is interesting, there are two key pieces of information that you need.
Thomas Ballin
1 minute read
Security Testing
How do you work out MTTR (Mean Time to Response)?
MTTR is all about looking at where you're handing your information over to the people who are responsible for fixing the vulnerabilities. Once it's handed over, the process has begun. So, we know where the timer starts, but where does it end?
Thomas Ballin
1 minute read
Vulnerability Management
Will there come a day where there are 0 vulnerabilities to find?
There's a growing potential for AI to remove many sources of vulnerabilities, but does that mean we're going to see a day where code is being written without any vulnerabilities being introduced into systems?
Thomas Ballin
3 minute read
Security Testing
Automated penetration testing - 5 key business benefits
Automated penetration testing is becoming increasingly popular. But how does this compare to manual penetration testing? Understand the main key benefits.
Thomas Ballin
3 minutes
Security Testing
How do you understand performance over time?
In order to get to grips with the performance of your software or product over time, you really need to be taking incremental measurements of your cybersecurity.
Thomas Ballin
8 min to read
Marketing Blogs
No items found.
Business Blogs
No items found.
Technology Blogs
No items found.