top of page
Our Security Lounge
Don't forget your coffee... or tea:)
Search
Angel Umez
Dec 6, 20242 min read
When to Use Threat Modeling Over Other Security Processes
When considering security processes, penetration testing, AppSec tools and fuzzing usually come to mind. But not threat modeling . Threat...
Angel Umez
Oct 21, 20243 min read
Why Your Security Problems Are About to Get Worse
So it's Q4. Everyone is ramped up, trying to hit their annual goals. One problem–your security problems are about to snowball. Because...
Angel Umez
Sep 23, 20243 min read
C-Level Executives Can Learn from the Biggest Cybersecurity Breaches
Cybersecurity breaches are almost always “the end of the world” for fintech companies, where sensitive financial data and consumer trust...
Angel Umez
Jul 24, 20245 min read
How to Create a Strong Incident Response Plan: A Guide for Business Leaders
How prepared is your business for a cybersecurity breach? A breach alone is not a disaster, but mishandling it is. — Serene Davis...
Angel Umez
Jul 22, 20242 min read
Crowdstrike Outage Is The Wakeup Call We Need For Security
We always say, "The world's technology runs on software. Secure software makes the world better." And we are proven right again by the...
Angel Umez
Mar 11, 20244 min read
Application Security Tools You Need for Security and Customer Retention
Ever been betrayed? You tell a friend a secret and suddenly, other people know of it. It wouldn't matter if your friend said: “I tried”....
Angel Umez
Jan 12, 20242 min read
Best of 2023: Our Top Cybersecurity Content
One of the responsibilities that bring us joy at Resilient is creating and sharing insights that help software companies stay secure and...
Angel Umez
Dec 3, 20233 min read
After SOC 2 Compliance, What Next?
So you've got your SOC 2 compliance report, congratulations! For nearly every business with customer data, SOC 2 compliance can be one...
Angel Umez
Oct 18, 20233 min read
A Tool To "Close All Security Gaps". Is That Realistic?
The best advancements in technology are the tools that allow us to do multiple things at once. Take the cellphone: containing the clock,...
Angel Umez
Sep 28, 20235 min read
Threat Modeling is the Key to Improving Your Security Posture
Threat Modeling should be as frequent as the changes in your software. Here is something we can all relate to: When getting ready for an...
Angel Umez
Sep 13, 20232 min read
Defend, Don’t Mend: The Security Risk Assessment to Revolutionize Your Security
In today's Web3 landscape, security is not just an option; it's a necessity. Cyber threats are becoming increasingly sophisticated and...
Angel Umez
Aug 21, 20234 min read
Automated Security Testing: How Far Left Should Security Testing Start?
Automated Security Testing (AST) is one of the recent forms of enforcing security at software-based organizations. There are claims that...
Angel Umez
Aug 7, 20234 min read
Functional Code Doesn't Equal Secure Code. Here’s Why Your Blockchain App Needs Review
Let's say you have a checklist to qualify when your code is ready to be deployed. You want to ensure it can do a couple of things and...
Angel Umez
Jul 24, 20235 min read
Security Compliance: Everything to Know About SOC 2 Audits
If customers or partners are already asking for proof you’re SOC 2 compliant, you need to check this out.
Ayomide Odukoya
Apr 10, 20233 min read
Security Compliance for Blockchain Startups
Discover one of the few open security standards for smart contracts and dApps (decentralized Apps).
Resilient Software Security
Feb 27, 20234 min read
Beyond Penetration Testing: 4 Ways to Implement Continuous Security Testing for SaaS
With modern tools, you can automate continuous security testing of any SaaS app and its cloud infrastructure.
Brook S.E. Schoenfield
Jan 19, 20234 min read
What's Missing in Web3 Security?
Web3/ Blockchain attacks generate a lot of buzz. Startups in that space are usually security sensitive, with more due diligence earlier on.
Resilient Software Security
Jan 10, 20232 min read
The CircleCI Security Breach: What Your Team Needs To Know
Another software company has fallen victim to a security breach, with CircleCI joining the list of major applications such as LastPass,...
Damilare
Jan 2, 20233 min read
4 Essential Security Tests To Execute in 2023 and 10 Free Tools
Discover the 4 essential security tests that your team should be executing to reduce cyber risk and costs while speeding up compliance.
Ayomide Odukoya
Dec 19, 20224 min read
SaaS Goals 2023: Reduce Software Risk via Threat Modeling Automation (Part 1)
What if free automation could help you discover relevant software security threats and defenses... as early as product concept or design?
Need strong security for your SaaS business?
We are here for you. Schedule a Risk assessment now.
bottom of page