Research into the hidden risks that organizations face from the unmanaged use of Shadow Code on their websites. Sponsored by PerimeterX.
The findings of an investigation into the use of open-source components in commercial off-the-shelf software—many of which have a list of known vulnerabilities—across five common software categories. Sponsored by GrammaTech.
An analysis of eight pentest providers in three categories: Assurance Consultancies, Boutique Security Consultancies and Managed Bug Bounty. Part 2 of a three-part white paper series. Sponsored by Cobalt Labs.
The history and background of pentesting, including barriers to the procurement of pentesting capabilities. Part 1 of a three-part white paper series. Sponsored by Cobalt Labs.
Learn how you can manage risk from third-party code and better protect your applications. Sponsored by PerimeterX.
Why current approaches to security management are no longer adequate, and why security should be part of the software development process. Sponsored by ZeroNorth.