Visit Security Journey

Post listing page

Topic: Definitions

Application Security offensive training definitions

Finding Vulnerabilities:  Differences among Vulnerability Scanning, Pen Testing, Bug Bounty, Red Team and Purple Team Compared

  When designing systems to be impervious to outside activity, you should always aim to be at least two steps ahead of your adversaries. Whatever it is that you want to protect, whether...

Continue Reading

DevSecOps definitions Introduction

What Are Git Hooks?

Hooks are scripts that run at different steps during the commit process. They are completely customizable and will trigger events at key points during the development life cycle. Some...

Continue Reading