Mayhem Blog

Common Mayhem CWE Finds: Reachable Assertion

Common Mayhem CWE Finds: Reachable Assertion

In this blog post series, we're diving into Mayhem's top common weaknesses enumeration (CWE) finds. This post discusses the reachable assertion.
How to Run a New Code Project With Mayhem in 5 Easy Steps

How to Run a New Code Project With Mayhem in 5 Easy Steps

In this blog post, we will walk you through the process of launching a new code project using Mayhem.
Best Practices for Secure Programming in Rust

Best Practices for Secure Programming in Rust

Rust's memory safety and type system help prevent entire classes of vulnerabilities, but that doesn't mean Rust's code is impervious to security issues. Learn some best practices and recommendations for secure application development in Rust.
Best Practices for Secure Programming in C++

Best Practices for Secure Programming in C++

Learn about common security threats in C++ applications and best practices for secure coding with examples.
Too Many Security Testing Tools? Here Are 5 Things Your DevSecOps Tools Should Do

Too Many Security Testing Tools? Here Are 5 Things Your DevSecOps Tools Should Do

In this blog post, we'll delve into the five essential boxes that your DevSecOps tools need to check.
SCA, SBOM, Vulnerability Management, SAST, or DAST Tools: Which Is Best for Your Team?

SCA, SBOM, Vulnerability Management, SAST, or DAST Tools: Which Is Best for Your Team?

There are a lot of options for software security testing tools. How do you know which ones are right for you? In this blog post, I'm going to cover a simple two-step process that will allow you to pick the best software security tool for your organization.
3 Reasons Your Security Testing Tool Needs To Do Regression Testing

3 Reasons Your Security Testing Tool Needs To Do Regression Testing

Learn what regression testing means, how it affects security, and three reasons why modern teams need regression testing to complement other security testing strategies.
7 Essential DevSecOps Best Practices Every Development Team Should Implement

7 Essential DevSecOps Best Practices Every Development Team Should Implement

This blog post explores the DevSecOps best practices that development teams can use to ensure that security is ingrained in the development process.
4 Common Causes of False Positives in Software Security Testing

4 Common Causes of False Positives in Software Security Testing

Why do false positives occur in software testing, and what can teams do about them? This article discusses those questions by explaining common causes of false positives and how to mitigate them.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.