Introductietekst van het downloadportal

Cert2Connect
(Whitepaper)

Whitepaper Why QA Should be Doing Security Testing

Download
(Whitepaper)

NeuraLegion White paper 2018

Download
(Whitepaper)

DAST – The Winning Approach To Microservices Security

Download
(Whitepaper)

Whitepaper The challenges of testing mobile applications

Download
(Whitepaper)

Whitepaper Find Unknown vulnerabilities using NexFuzz

Download
(Whitepaper)

IdentifyAdaptRespond Rescana

Download
(Whitepaper)

OSINT Trends Rescana

Download
(Whitepaper)

Whitepaper TPRM or Cyber ratings What do you really need

Download
(Whitepaper)

RiskRatingVsTPRM

Download
(Brochure)

IdentifyAdaptRespond Rescana

Download
(Brochure)

RiskRatingVsTPRM

Download
(Brochure)

OSINT Trends Rescana

Download
Focus Cloud Security (Whitepaper)

The key threats and risks that third-parties create to websites

Download
Focus Cloud Security (Whitepaper)

De belangrijkste bedreigingen en risico’s voor websites veroorzaakt door third-parties

Download
Focus Supply Chain Security (Whitepaper)

Why websites are port scanning end users computers

Download
Focus Supply Chain Security (Whitepaper)

Why your web application firewall (WAF) will not help against third-party website attacks?

Download
Focus Cloud Security (Whitepaper)

Third party risk report by Reflectiz for the Bank of USA (demo)

Download
Focus Supply Chain Security (Whitepaper)

The risks of ex-domain re-use on websites and how to stay protected against it.

Download
Focus Cloud Security (Whitepaper)

The Gocgle web skimming campaign, by Reflectiz

Download
Focus Cloud Security (Whitepaper)

The cyber security effects of fourth parties on websites by Reflectiz

Download
Focus Supply Chain Security (Whitepaper)

Insights about Ticketmaster's £1.25M penalty for security failures

Download
Focus Supply Chain Security (Whitepaper)

The Magecart hacking groups

Download
Focus Cloud Security (Whitepaper)

Compliance for Third-Party scripts on your website and how to ensure it

Download
Focus Supply Chain Security (Whitepaper)

De belangrijkste bedreigingen en risico's voor websites door 3rd Party Apps

Download
Focus Cloud Security (Whitepaper)

CSP, the right solution for the web-skimming pandemic?

Download
Focus Cloud Security (Brochure)

Reflectiz - Use Cases

Download
Focus Supply Chain Security (Brochure)

Validate Your Privacy Policies In Minutes - OnePager

Download
Focus Supply Chain Security (Brochure)

Continuous Web Threat Management

Download
Focus Supply Chain Security (Brochure)

Put Client Side Security at the Forefront

Download
Focus Cloud Security (Brochure)

Third-party Apps: the Blind Spots of Website Security

Download
(Whitepaper)

Software Supply Chain Security Why You Should Care

Download
(Whitepaper)

SBOMs You Can't Secure What You Don't Know

Download
(Whitepaper)

The Checkmarx Approach to API Security

Download
(Whitepaper)

eBook A Guide to Modern API Security

Download
(Whitepaper)

Dropping the SBOM Why the Industry Must Unite to Defend Against Software Supply Chain Cybercrime

Download
(Whitepaper)

White Paper Checkmarx Fusion Correlation AST Imperative in MAD

Download
(Brochure)

solution brief scs checkmarx supply chain security

Download
(Brochure)

solution brief kics infrastructure as code iac security scanning solution

Download
(Brochure)

sast checkmarx static application security testing

Download
(Brochure)

cxsca software composition analysis checkmarx

Download
(Brochure)

codebashing appsec awareness and secure code training

Download
(Brochure)

Solution Brief Checkmarx Fusion™

Download
(Brochure)

Solution Brief Checkmarx One Application Security Platform

Download
(Brochure)

Solution Brief Checkmarx API Security

Download
(Brochure)

Datasheet Why Checkmarx

Download
(Whitepaper)

Cymulate Are You APT Ready Action Plan Whitepaper 1

Download
Focus Cyber Security (Whitepaper)

Automated PenTest vs BAS

Download
(Whitepaper)

Cymulate and the NIST Cyber Security Framework

Download
(Whitepaper)

Cymulate A Year in Breach and Attack Simulation 2019

Download
(Whitepaper)

16 ways BAS Increases Cyber Security ROI Whitepaper

Download
(Whitepaper)

Cymulate whitepaper Contextualizing the MITRE ATT&CK Framework

Download
(Whitepaper)

Cymulate and the NIST Cyber Security Framework.docx

Download
(Whitepaper)

Cymulate - Cyber Insurers Whitepaper

Download
(Whitepaper)

Cymulate - Randsomware Whitepaper

Download
(Brochure)

The Ultimate Guide for Security Posture Management

Download
Focus Cyber Security (Brochure)

Cymulate - One Pager

Download
Focus Cyber Security (Brochure)

KELA Cybercrime Investigations

Download
Focus Cyber Security (Whitepaper)

KELA External Attack Surface Visibility

Download
Focus Cyber Security (Brochure)

KELA Risk Assessment and Dissemination

Download
Focus Cyber Security (Whitepaper)

Cyber Insurers Whitepaper

Download
Focus Cyber Security (Brochure)

Cymulates Vectors Brochure

Download
Focus Cyber Security (Brochure)

Cymulate Vision Brochure

Download
(Brochure)

The Importance of Deploying a Developer Focused DAST Solution

Download
(Brochure)

Log4Shell Attack - Quick Guide for First Response

Download
(Brochure)

2021 Resiliency to Ransomware Survey Results report

Download
(Brochure)

Wat is webskimming - NL Whitepaper

Download
(Brochure)

C2C Whitepaper Applicatie Security Testen: waarom één plus één zes kan zijn

Download
(Brochure)

C2C Whitepaper Compliance en Third Party scripts NL

Download
(Brochure)

The Key Threats and Risks That Third Parties Create to Websites - EN

Download
(Brochure)

De belangrijkste bedreigingen en risico’s voor websites veroorzaakt door Third party Apps

Download
(Brochure)

Ebook - The Complete Guide to Developer Secure Coding Education

Download
(Brochure)

An Integrated Approach to Embedding Security into DevOps - A Best Practices Guide

Download
(Brochure)

Open Source Cookbook - The Ultimate Guide to Software Composition Analysis

Download
(Brochure)

Simulating the Latest Threats and Techniques with the MITRE ATT&CK Matrix

Download
(Brochure)

Boosting Red and Blue Team Effectiveness with Cyber Attack Simulation

Download
(Brochure)

Responding to the Current Threat Landscape: Continuous, Comprehensive Security Effectiveness Testing

Download
(Brochure)

Automated Pen Testing vs Breach & Attack Simulation

Download
(Brochure)

16 Ways BAS Increases Cyber Security ROI

Download
(Brochure)

Compliance for Third Party scripts on your website and how to ensure it - EN

Download