An analysis of eight pentest providers in three categories: Assurance Consultancies, Boutique Security Consultancies and Managed Bug Bounty. Part 2 of a three-part white paper series. Sponsored by Cobalt Labs.
The history and background of pentesting, including barriers to the procurement of pentesting capabilities. Part 1 of a three-part white paper series. Sponsored by Cobalt Labs.
Learn how you can manage risk from third-party code and better protect your applications. Sponsored by PerimeterX.
Why current approaches to security management are no longer adequate, and why security should be part of the software development process. Sponsored by ZeroNorth.