Forem

Mark profile picture

Mark

An Inspiring Force of Knowledge Driven by curiosity and a passion for learning, Mark is a beacon of inspiration who empowers others through the power of knowledge.

Joined Joined on 
AI Code Review: How to Make it Work for You

AI Code Review: How to Make it Work for You

1
Comments 1
5 min read
7 Man-in-the-Middle (MitM) Attacks to Look Out For
Cover image for 7 Man-in-the-Middle (MitM) Attacks to Look Out For

7 Man-in-the-Middle (MitM) Attacks to Look Out For

1
Comments 1
4 min read
7 CI/CD Security Best Practices to Focus on
Cover image for 7 CI/CD Security Best Practices to Focus on

7 CI/CD Security Best Practices to Focus on

1
Comments 1
4 min read
The Required API Security Checklist [XLS download]
Cover image for The Required API Security Checklist [XLS download]

The Required API Security Checklist [XLS download]

Comments
5 min read
Top 10 Adversarial Exposure Validation (AEV) Tools
Cover image for Top 10 Adversarial Exposure Validation (AEV) Tools

Top 10 Adversarial Exposure Validation (AEV) Tools

Comments
4 min read
AI Security Testing: How to Find Vulnerabilities in AI Applications
Cover image for AI Security Testing: How to Find Vulnerabilities in AI Applications

AI Security Testing: How to Find Vulnerabilities in AI Applications

Comments
5 min read
7 Cybersecurity Concerns Related to The MCP Protocol
Cover image for 7 Cybersecurity Concerns Related to The MCP Protocol

7 Cybersecurity Concerns Related to The MCP Protocol

Comments
5 min read
Cyber Resilience vs Cyber Security: Is There a Difference?

Cyber Resilience vs Cyber Security: Is There a Difference?

Comments
4 min read
9 Linux Security Tools You Need to Know
Cover image for 9 Linux Security Tools You Need to Know

9 Linux Security Tools You Need to Know

Comments
5 min read
A Step-by-step guide to Javascript Unit Testing

A Step-by-step guide to Javascript Unit Testing

Comments
5 min read
What Are Non-Human Identities, and Why Should Security Teams Care?
Cover image for What Are Non-Human Identities, and Why Should Security Teams Care?

What Are Non-Human Identities, and Why Should Security Teams Care?

Comments
4 min read
8 Key Risks of Non-Human Identities: From Data Breaches to Credential Stuffing
Cover image for 8 Key Risks of Non-Human Identities: From Data Breaches to Credential Stuffing

8 Key Risks of Non-Human Identities: From Data Breaches to Credential Stuffing

Comments
4 min read
Top 10 Web Application Penetration Testing Tools
Cover image for Top 10 Web Application Penetration Testing Tools

Top 10 Web Application Penetration Testing Tools

1
Comments
9 min read
loading...