Featured Posts

All Blog Posts

  • Tooling

Our Approach to Building Security Tooling

  • icon Nov 01, 2023
  • icon 11 minutes read
  • icon 2240
Introduction Most “security tools” today are typically composed by code that consumes an API and applies predefined logic to identify issues. This is generally accomplished by: Fetching a subset of the endpoints exposed by the service / …
Read more