Skip to main content
Home
Our ContributorsAbout
 
  • App Dev & Testing

    Get up to speed fast on the techniques behind successful enterprise application development, QA testing and software delivery from leading practitioners.

    View all   
    Global software dominance awaits

    The dangers of inadequate localization testing

    Don't call the realtor until you read this

    Leaving the Valley: Top cities for dev and test pro relocations

    Put all the pieces together

    The 5 stages of highly successful software risk assessments

    Make the new normal purr

    How to close your testing talent gaps in the remote work era

    Get on target with your career

    How to thrive as a QA pro in an agile organization

  • Enterprise IT

    Trends and best practices for provisioning, deploying, monitoring and managing enterprise IT systems. Understand challenges and best practices for ITOM, hybrid IT, ITSM and more.

    View all   
    Lend privilege to increase diversity

    INSPIRE 20 Podcast: Anjuan Simmons, Help Scout

    Make your DX approach soar

    KubeCon + CloudNativeCon Europe: Cloud native goes mainstream

    Go forth and subcluster

    Why you should share BI resources with your data science teams

    Equality in overdrive

    INSPIRE 20 Podcast: June Manley, Female Founders Faster Forward

    Give them the help they need

    ESM essentials: What it is, why it matters

  • Security

    All things security for software engineering, DevOps, and IT Ops teams. Stay out front on application security, information security and data security.

    View all   
    The smart money is on resilience

    A SOC reality check: Top SecOps team challenges and best practices

    Cloud-native delivers cyber resilience

    How digital transformation is changing the role of the CISO

    Take charge of your own security

    How to make your cloud service cyber resilient

    Confusing signage
    Security Blogwatch

    Lesson from supply chain attacks: Beware 'dependency confusion'

    An insider's guide to more resilient code

    How to put the Threat Modeling Manifesto into action

  • GUIDES
  • CONFERENCES
Subscribe
Home
  • Our Contributors
  • About
Subscribe
  • App Dev & Testing
  • Enterprise IT
  • Security
  • Guides
  • Conferences
  • Our Contributors
  • About
Subscribe
Guides
Conferences

About Martin Hell

Martin Hell
Security Strategist
Debricked
1 article

Martin Hell is Security Strategist at Debricked and was part in co-founding the company in 2018. He is also an Associate Professor at Lund University, teaching computer security, web security, and cryptology for over 14 years. His area of research is in software security and cryptology. Prior to Debricked, he spent a few years as a visiting researcher at Ericsson.

  • Recent
  • Popular
Shop's come in we're open sign on a blue door
There is no one-stop shop for handling supply chain attack threats. Better protection of credentials is a start. There are other steps OSS...
Martin Hell
Apr 20, 2022
How to close OSS attack vectors in your supply chain
Come in, we're open

Subscribe to TechBeacon

Get the best of TechBeacon, from App Dev & Testing to Security, delivered weekly.

SUBSCRIBE
Show More

Home

Brought to you by
HP

Topics

  • App Dev & Testing
  • Enterprise IT
  • Security
  • GUIDES
  • CONFERENCES

TechBeacon

  • About
  • Our Contributors
  • Terms of Use
  • Privacy
Cookie Privacy Manager

Subscribe to TechBeacon

Get the latest delivered straight to your inbox.

What topics interest you?

I'd like to receive emails from TechBeacon and Micro Focus to stay up-to-date on products, services, education, research, news, events, and promotions.

Sign up

Thanks for subscribing!

Check your email for the latest from TechBeacon.

© Copyright 2015 – 2022 Micro Focus or one of its affiliates
Back to top