Thinking in states to handle information security complexities
How exploratory testing helps in driving the success factor of security testing
security measures, policies that we do for literal namesakes
Gaps in information security communities for product security engineers
Evaluation of Container Scanning tools and techniques
Mapping Security initiaties to organisational values
Secure Design process to be followed for great outcomes
Use case of Security Top 10 and Custom TOP N for your needs
Process before jumping into security roadmap
Making a win-win deal with development team