CVE Under Threat: What You Need to Know
MITRE’s CVE contract expired on April 16, putting global vulnerability tracking at risk. Learn what’s happening and how the security community is responding.
Posts about Application Security, Software Security, Secure Development Lifecycle, and DevSecOps.
MITRE’s CVE contract expired on April 16, putting global vulnerability tracking at risk. Learn what’s happening and how the security community is responding.
Some software vulnerabilities are unforgivable—easy to find, easy to fix, and never should’ve existed. Here’s how to spot and prevent them.
Discover how SAMMY, a comprehensive management tool, enhances software security by effectively implementing the OWASP Software Assurance Maturity Model (SAMM).
Enhance Software Security with SAMMY and OWASP SAMM Read More »
Find out about the top critical security vulnerabilities we found in 2021. Get your free copy of the BSG 2021 Annual Report to learn more.
BSG project statistics: number of found vulnerabilities, average findings per project, and the notorious attack scenarios.
Discerning cyber security testing services could be complex even for cyber security experts. In this post, we attempt to put these terms in order.
This week Serhii Korolenko has obtained a Burp Suite Certified Practitioner certificate, and we congratulate him on this achievement!
The video and slides of our webinar on Black-box vs. White-box vs. Gray-box testing. Enjoy! And don’t hesitate to ask questions in the comments or via email.
Software supply chain security is in the news again, along with the Trojan Source attack on modern software compilers. Why is it so important?
Why Is Software Supply Chain Security Important? Read More »
BSG has conducted an application pentest for the Ukrainian Bone Marrow Donors Registry. Why it matters and how it relates to you?
BSG provides UMBDR a Pro Bono Application Pentest Read More »