We take a look at the Zed Attack Proxy as it moves away from OWASP and towards the Software Security Project
We put a lot of effort into testing our CTF platform, but a simple oversight nearly meant we had to call it off.
We use Cloudflare to protect our CTF from spam bots, VPNs and hackers.
We brought DevSecOps to UK Cyber Week with some tricky little challenges
AWS IAM permission boundaries allow you to safely delegate user and role creation permissions
Our DevSecOps CTF is May 4th this year, but what makes it tick?