Mayhem Blog

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Bringing DevSecOps to V-Shaped Development

Bringing DevSecOps to V-Shaped Development

In this blog post, we'll explore how automotive organizations can seamlessly incorporate DevSecOps into the V-shaped development model.
The Hacker Mind Podcast: The Rise Of Bots (Why You Didn't Get Taylor Swift Tickets)

The Hacker Mind Podcast: The Rise Of Bots (Why You Didn't Get Taylor Swift Tickets)

Antoine Vastel from DataDome explains how detecting bots is an arms race: the better we get at detecting them, the more the bots evolve to evade detection.
Mayhem Makers: Ross Rogers, Staff Software Engineer

Mayhem Makers: Ross Rogers, Staff Software Engineer

“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Ross Rogers, Staff Software Engineer at Mayhem.
What is an SBOM? Exploring SBOM Origins and Use in Software Security

What is an SBOM? Exploring SBOM Origins and Use in Software Security

In this blog post, we'll break down what an SBOM is, where they came from, and how recent legislation has outlined their use in software supply chain security.
The Hacker Mind Podcast: When Old Medical Devices Keep Pre-Shared Keys

The Hacker Mind Podcast: When Old Medical Devices Keep Pre-Shared Keys

You'd think there's an end-of-life procedure to erase personal health and network configuration information from medical devices. Deral Heiland says otherwise.
Key Takeaways from SecTor 2023

Key Takeaways from SecTor 2023

This was my first year attending SecTor in person. Here are my key takeaways from the Conference.
Auto-ISAC Summit 2023: A Summary

Auto-ISAC Summit 2023: A Summary

The Auto-ISAC held its 2023 Summit on October 17-18 in Torrance, CA. Read on to learn the main topics discussed at the summit.
The Hacker Mind Podcast: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology

The Hacker Mind Podcast: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology

Ransomware is now old news. Attackers are skipping the encryption and simply extorting the exfiltrated data, according to Thomas “Mannie” Wilken.
Mayhem Makers: Grace Farley, Demand Generation Manager

Mayhem Makers: Grace Farley, Demand Generation Manager

“Mayhem Makers” is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Grace Farley, Demand Generation Manager.

How about some Mayhem in your inbox?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.