Mayhem Blog

Software Is Assembled

Software Is Assembled

It is important to understand that there is no 100% in security. Frankly, it is impossible to secure everything all the time. So more often than not, we're putting obstacles in front of an adversary, so they go somewhere else. That's not defeatist; that's reality.
Matt Tait Warns of Stolen Zero Days at Black Hat USA 2021

Matt Tait Warns of Stolen Zero Days at Black Hat USA 2021

Matt Tait opened Day 1 of Black Hat USA 2021 with a remote keynote presentation on supply chain compromises entitled “Supply Chain Infections and the Future of Contactless Deliveries.”
Black Hat USA 2021 Opens With Security Parallels To COVID Immunity

Black Hat USA 2021 Opens With Security Parallels To COVID Immunity

In it's first-ever hybrid conference, Black Hat USA 2021 opened last week with Black Hat and DEF CON founder Jeff Moss challenging the audience to think about immunizing against malware not just their own systems, but other systems as well.
Secure Software Leads To New Possibilities

Secure Software Leads To New Possibilities

Secure software creates new possibilities. Businesses that did not exist before the creation of new software are today allowing us to share cars, share homes, stream from home, work from home and arrange, same day home delivery.
The Evolution of Security Testing

The Evolution of Security Testing

Security needs to be part of the development experience. This has given rise to the application security space. And, like the internet itself, it needs to evolve.
The Move Toward Continuous Testing

The Move Toward Continuous Testing

DevSecOps is the expansion of DevOps that includes security professionals as well. The idea is for everyone to be looking at the code together, rather than in silos. This will produce the most robust and resilient software with the least amount of time and cost.
A Guide To Automated Continuous Security Testing in DevOps

A Guide To Automated Continuous Security Testing in DevOps

The acceleration of application development has shown no sign of stopping. As a result, we’re seeing increasingly complex, interconnected software. These forces are driving organizations to go beyond merely identifying common security errors or protecting against common attack techniques.
How Fuzzing Redefines Application Security

How Fuzzing Redefines Application Security

The Application Security Testing market is highly fragmented. From SAST to DAST to SCA to IAST to RASP, what is the best? Our answer: Autonomous testing through fuzz testing and symbolic execution.
Satisfy 5 DoD DevSecOps Requirements with One Tool

Satisfy 5 DoD DevSecOps Requirements with One Tool

First and foremost, if you’re implementing DevSecOps in the DoD, kudos to you for taking initiative. DevSecOps is enabling the Department to develop quickly and securely, so organizations can continuously meet critical and urgent needs of the warfighter.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.