Secjuice
  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
Sign in Subscribe
Manuel D'Orso

Manuel D'Orso

Security as Code: Writing security requirements in Gherkin
TECHNICAL

Security as Code: Writing security requirements in Gherkin

An easy DevSecOps methodology to inject security requirements inside an application's repository.
Aug 16, 2020 2 min read
Homegrown Cyber Threat Intelligence With STIX2 and Couchbase
TECHNICAL

Homegrown Cyber Threat Intelligence With STIX2 and Couchbase

Threat intelligence is an important part of incident response and vulnerability management, in this article we show you how to create and archive threat intelligence, without paying vendors, using STIX and Couchbase.
Apr 14, 2019 6 min read
Page 1 of 1
Secjuice © 2023
  • Remote Browser Isolation
  • Zero Trust Consultancy
Powered by Ghost