Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Why Fuzz Test: 20 Mozilla Vulnerabilities Found With Fuzz Testing

Why Fuzz Test: 20 Mozilla Vulnerabilities Found With Fuzz Testing

Recently, Mozilla, makers of the Firefox browser, reported 20 vulnerabilities they found through fuzz testing their code.
The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

In this episode, I’m going to talk about Star Wars. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats.
3 Steps to Automate Offense to Increase Your Security in 2023

3 Steps to Automate Offense to Increase Your Security in 2023

I was recently challenged to come up with the best methods you can use in 2023 to make the systems you are developing more secure. I realized it boils down to one thing: automating offense as part of your defensive security program.
Top 3 Cyber Predictions in 2023 and How You Can Prepare

Top 3 Cyber Predictions in 2023 and How You Can Prepare

What will cyber offense start doing this year, and how can you prepare? I’m David Brumley, CEO of ForAllSecure, and here are my top three predictions for offense in 2023.
Mayhem Makers: Shawn Santos, Director of Sales

Mayhem Makers: Shawn Santos, Director of Sales

This is a Q&A series dedicated to our growing company. For this month’s profile, we talked with Shawn Santos, Director of Sales.
The Hacker Mind Podcast: Tib3rius

The Hacker Mind Podcast: Tib3rius

Web application security. OSCP exam. Life as a pen tester.
Looking Back: 6 Things ForAllSecure Accomplished in 2022

Looking Back: 6 Things ForAllSecure Accomplished in 2022

As we move into 2023, we are taking some time to look back at our accomplishments and milestones over the previous year.
How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

How Mayhem Fits Into the Federal Guidance for Securing the Software Supply Chain

In this blog post, we’ll take a deeper look at the NIST guidance for software development. In particular, we’ll look at PW 8.2 in NIST 800-218.
What does the Federal Guidance on Securing the Software Supply Chain Mean for Developers?

What does the Federal Guidance on Securing the Software Supply Chain Mean for Developers?

In this blog, we’ll take a look at Part One of the Securing The Software Supply Chain series released by the NSA, the CISA, and the ODNI.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.