Cider Blog

Our Thoughts and Insights on Application Security


How much would enterprises spend for being made aware of a single supply chain vulnerability?
TL;DR – A lot they would!!! Bug bounty has taken the world by storm. Large corporations pay bug bounty h...
Visualizing CI/CD from an attacker’s perspective
CI/CD environments and processes are increasingly becoming a key area of focus for both hackers and — conseq...
Cider Security has been acquired by Palo Alto Networks