Application Security
Breaking news, news analysis, and expert commentary on application security, including tools & technologies.
Figurines standing on a piece of paper with arrows, indicating different paths![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfc7a2d4aae315bc4/65eb7c3704bbac040a60900a/CISO-ronstik-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)
Cybersecurity Operations![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltfc7a2d4aae315bc4/65eb7c3704bbac040a60900a/CISO-ronstik-Alamy.jpg?width=700&auto=webp&quality=80&disable=upscale)
CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava LampsCISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.