Forem

Sam Bishop profile picture

Sam Bishop

I enjoy writing and sharing my views on cybersecurity and its latest news.

Location Wilmington, DE Joined Joined on  Personal website https://medium.com/@sam.bishop

Pronouns

He/Him

Work

Cybersecurity Consultant

Understanding Business Logic Attacks in SaaS and How to Prevent Them
Cover image for Understanding Business Logic Attacks in SaaS and How to Prevent Them

Understanding Business Logic Attacks in SaaS and How to Prevent Them

Comments
4 min read

Want to connect with Sam Bishop?

Create an account to connect with Sam Bishop. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
CI/CD Security for SaaS Teams: Protecting Pipelines from Code to Cloud
Cover image for CI/CD Security for SaaS Teams: Protecting Pipelines from Code to Cloud

CI/CD Security for SaaS Teams: Protecting Pipelines from Code to Cloud

Comments
4 min read
Why Penetration Testing Is Critical for Banking Cybersecurity
Cover image for Why Penetration Testing Is Critical for Banking Cybersecurity

Why Penetration Testing Is Critical for Banking Cybersecurity

Comments
4 min read
How Penetration Testing Strengthens SaaS Application Security
Cover image for How Penetration Testing Strengthens SaaS Application Security

How Penetration Testing Strengthens SaaS Application Security

Comments
4 min read
FinTech Security Testing Costs Simplified: A Practical Breakdown
Cover image for FinTech Security Testing Costs Simplified: A Practical Breakdown

FinTech Security Testing Costs Simplified: A Practical Breakdown

Comments
4 min read
Top SaaS Application Security Tools Every Business Should Know
Cover image for Top SaaS Application Security Tools Every Business Should Know

Top SaaS Application Security Tools Every Business Should Know

Comments
4 min read
How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats
Cover image for How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

How Penetration Testing Protects FinTech Apps from Evolving Cyber Threats

Comments
5 min read
The Most Common FinTech App Security Weaknesses You Can’t Overlook
Cover image for The Most Common FinTech App Security Weaknesses You Can’t Overlook

The Most Common FinTech App Security Weaknesses You Can’t Overlook

3
Comments
4 min read
Qualys vs ZeroThreat: Strengths, Limitations, and Use Cases

Qualys vs ZeroThreat: Strengths, Limitations, and Use Cases

1
Comments
4 min read
Burp Suite Alternative: Why ZeroThreat Fits Modern DevSecOps
Cover image for Burp Suite Alternative: Why ZeroThreat Fits Modern DevSecOps

Burp Suite Alternative: Why ZeroThreat Fits Modern DevSecOps

5
Comments
3 min read
Vulnerability Assessment Costs: A Complete Breakdown
Cover image for Vulnerability Assessment Costs: A Complete Breakdown

Vulnerability Assessment Costs: A Complete Breakdown

1
Comments
3 min read
When Is Automated Penetration Testing the Better Fit for Developer-First Security Workflows?
Cover image for When Is Automated Penetration Testing the Better Fit for Developer-First Security Workflows?

When Is Automated Penetration Testing the Better Fit for Developer-First Security Workflows?

1
Comments
4 min read
A Practical Guide to Free Vulnerability Scanners for Developers and Security Teams
Cover image for A Practical Guide to Free Vulnerability Scanners for Developers and Security Teams

A Practical Guide to Free Vulnerability Scanners for Developers and Security Teams

Comments
3 min read
What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know
Cover image for What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know

1
Comments 1
4 min read
Creating a Local XSS Payload Tester Using Node.js
Cover image for Creating a Local XSS Payload Tester Using Node.js

Creating a Local XSS Payload Tester Using Node.js

1
Comments
3 min read
9 Free Web App Vulnerability Scanners You Should Know in 2025
Cover image for 9 Free Web App Vulnerability Scanners You Should Know in 2025

9 Free Web App Vulnerability Scanners You Should Know in 2025

1
Comments
4 min read
✅ CI/CD Penetration Testing Integration Checklist

✅ CI/CD Penetration Testing Integration Checklist

1
Comments
2 min read
🛡️ Top 10 Free Penetration Testing Tools Every Security Team Should Use in 2025
Cover image for 🛡️ Top 10 Free Penetration Testing Tools Every Security Team Should Use in 2025

🛡️ Top 10 Free Penetration Testing Tools Every Security Team Should Use in 2025

1
Comments
3 min read
🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know
Cover image for 🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know

🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know

Comments
4 min read
10 Free Vulnerability Scanners Every Developer Should Know in 2025
Cover image for 10 Free Vulnerability Scanners Every Developer Should Know in 2025

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Comments
2 min read
Best DAST Tools to Know About
Cover image for Best DAST Tools to Know About

Best DAST Tools to Know About

Comments
2 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)
Cover image for A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
loading...