Using Components With Known Vulnerabilities

OWASP A9: Using Components With Known Vulnerabilities – Why You Can’t Ignore It

Open source software has revolutionized the modern tech industry, and nowhere is that more evident than the realm of web application development. Thanks to open source languages, frameworks and development tools, developers are able to create rich and complex web applications, usually at a fraction of the cost— in both ... Read More
Compliant With NIST

Are You Compliant with NIST 800-171?

In June 2015, the U.S. National Institute of Standards and Technology (NIST) released its latest set of guidelines for the handling of Controlled Unclassified Information (CUI), comprising data including personally identifiable information (PII), banking, health information or other sensitive bits of data that one would not want falling into the ... Read More
Security Boulevard