Mayhem Case Studies

Expert insights and tips on application security, API security, and other DevSecOps topics.

View All
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The Hacker Mind Podcast: Hacking Human Behavior

The Hacker Mind Podcast: Hacking Human Behavior

Could the nudges and prompts like those from our Fitbits and Apple watches be effective in enforcing good security behavior as well?
Meet The Team Behind Mayhem: Come See Us At These Upcoming June 2023 Events

Meet The Team Behind Mayhem: Come See Us At These Upcoming June 2023 Events

Learn about what the Mayhem team has been up to and our upcoming events planned for June 2023.
Certificate Transparency Does More Harm Than Good - Here's Why

Certificate Transparency Does More Harm Than Good - Here's Why

With Google’s recent decision to change the lock icon, I’ve been spending a lot of time thinking about TLS/SSL - and certificate transparency in general. In this blog post, I’ll explore both how Certificate Transparency is helpful and the downsides, including the way it shares users' information and the rise of beg bounties.
The Hacker Mind Podcast: Tales From A Ransomware Negotiator

The Hacker Mind Podcast: Tales From A Ransomware Negotiator

Say you’re an organization that’s been hit with ransomware. At what point do you need to bring in a ransomware negotiator? Should you pay, should you not? Mark Lance, the VP of DFIR and threat intelligence for GuidePoint Security, provides The Hacker Mind with stories of ransomware cases he’s handled.
Too Many Security Testing Tools? Here Are 5 Things Your DevSecOps Tools Should Do

Too Many Security Testing Tools? Here Are 5 Things Your DevSecOps Tools Should Do

In this blog post, we'll delve into the five essential boxes that your DevSecOps tools need to check.
SCA, SBOM, Vulnerability Management, SAST, or DAST Tools: Which Is Best for Your Team?

SCA, SBOM, Vulnerability Management, SAST, or DAST Tools: Which Is Best for Your Team?

There are a lot of options for software security testing tools. How do you know which ones are right for you? In this blog post, I'm going to cover a simple two-step process that will allow you to pick the best software security tool for your organization.
3 Reasons Your Security Testing Tool Needs To Do Regression Testing

3 Reasons Your Security Testing Tool Needs To Do Regression Testing

Learn what regression testing means, how it affects security, and three reasons why modern teams need regression testing to complement other security testing strategies.
7 Essential DevSecOps Best Practices Every Development Team Should Implement

7 Essential DevSecOps Best Practices Every Development Team Should Implement

This blog post explores the DevSecOps best practices that development teams can use to ensure that security is ingrained in the development process.
The Hacker Mind Podcast: The Internet As A Pen Test

The Hacker Mind Podcast: The Internet As A Pen Test

Small to Medium Business are, today, the target of APTs and ransomware. Often they lack the visibility of a SOC. Or even basic low level threat analysis. Chris Gray of Deepwatch talks about the view from the inside of a virtual SOC.

Fancy some inbox Mayhem?

Subscribe to our monthly newsletter for expert insights and news on DevSecOps topics, plus Mayhem tips and tutorials.

By subscribing, you're agreeing to our website terms and privacy policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.