Breaking the chain: A take on supply chain security from the 2023 RSA conferenceOut-of-the-Box Solutions for a growing threat: highlights and insights from the 2023 RSA conference on supply chain securityMay 12, 2023May 12, 2023
Cybersecurity meets AI: a labyrinthine odyssey to safeguard our digital livesDecoding the ai-cybersecurity convergence to explore the intricacies of harnessing artificial intelligence to fortify our digital worldMay 10, 2023May 10, 2023
The power of data visualization in cyber security: enhance open-source software resilienceHarnessing advanced data visualization techniques to strengthen security and address challenges in open-source software ecosystemMay 9, 2023May 9, 2023
Deepfake Malware Mayhem: When AI Goes Rogue and Fishes for PhishThe Ultimate Fusion of Machine Learning and Phishing Strikes — and How AI Can Help Us Counteract ThemMay 5, 2023May 5, 2023
From slow and steady to fast and furious: how DORA-like metrics can rev up your security…Discover how DORA-like metrics can revolutionize how security teams measure performance and achieve faster, safer, and more efficient…May 3, 2023May 3, 2023
GitHub’s repository scanning: protecting open source software and the software supply chainCybersecurity 101: protecting your software supply chain from sneaky cybercriminals with gitHub and CyberfameMay 2, 2023May 2, 2023
Cyberfame Manifesto: Charting Security’s Paradox in the Age of AI generated SoftwareWith generative AI reshaping software development, engineers become pioneering navigators through uncharted territories, curators of a…Apr 11, 2023Apr 11, 2023
The progressive path to decentralization and Web3The potential of decentralization — how to establish a progressive mindset and practice for businesses.Apr 7, 2023Apr 7, 2023
Get ahead of the security curve: steps for your ‘shift left’ journeyThe world of software development is constantly evolving, with new technologies and approaches emerging every day. However, one of the most…Mar 16, 2023Mar 16, 2023
Ethereum Improvement Proposals — a field shaping Ethereum Network and Web3What are the different components of an Ethereum Improvement Proposal (EIP), how does it work and what purpose do they serve?Mar 13, 20231Mar 13, 20231