Article

Articles and publications in external platforms

| Homelabs (1) |

Icon for article
LinkedIn Post - AI Governance Frameworks: EU AI Act, ISO 42001, NIST AI RMF
(12 Apr 2026)

LinkedIn Post - AI Governance Frameworks: EU AI Act, ISO 42001, NIST AI RMF

Icon for article
LinkedIn Post - OWASP Top 10 for LLM04: Data and Model Poisoning
(12 Apr 2026)

LinkedIn Post - OWASP Top 10 for LLM04: Data and Model Poisoning

Icon for article
LinkedIn profile
(12 Apr 2026)

LinkedIn profile

Icon for article
Sessionize speaker profile
(12 Apr 2026)

Placeholder for Sessionize speaker profile

Icon for article
A Day in the Life of a Security Leader
(06 Apr 2026)

Placeholder for A Day in the Life of a Security Leader

Icon for article
Axios npm Package Compromised
(31 Mar 2026)

Placeholder for Axios npm Package Compromised

Icon for article
Model Context Protocol (MCP) for Beginners
(30 Mar 2026)

Placeholder for Model Context Protocol (MCP) for Beginners

Icon for article
RSAC expert profile
(01 Mar 2026)

RSAC expert profile

Icon for article
Building AI at Scale Requires Governance at Speed
(27 Feb 2026)

Placeholder for Building AI at Scale Requires Governance at Speed

Icon for article
AI Bill Of Material and Application Security (AppSec)
(13 Jan 2026)

Placeholder for AI Bill Of Material and Application Security (AppSec)

Icon for article
AI Security 101 for AppSec Engineers
(09 Jan 2026)

Placeholder for AI Security 101 for AppSec Engineers

Icon for article
Kickstart your career in GenAI Security
(04 Jan 2026)

Placeholder for Kickstart your career in GenAI Security

Icon for article
Retrieval-Augmented Generation (RAG) Security
(03 Jan 2026)

Placeholder for Retrieval-Augmented Generation (RAG) Security

Icon for article
Learning about Large Language Models (LLMs)
(23 Dec 2025)

Placeholder for Learning about Large Language Models (LLMs)

Icon for article
OWASP Top 10 - Release Candidate
(19 Dec 2025)

Placeholder for OWASP Top 10 - Release Candidate

Icon for article
OWASP Top 10 LLM 2025
(26 Nov 2025)

Placeholder for OWASP Top 10 LLM 2025

Icon for article
Breaking into InfoSec with Vandana Verma
(19 Nov 2025)

Breaking into InfoSec with Vandana Verma

Icon for article
AppSec in the Age of AI: The Road to AI-DevSecOps
(14 Nov 2025)

Placeholder for AppSec in the Age of AI: The Road to AI-DevSecOps

Icon for article
Securing Agentic AI Apps using OWASP Securing Agentic Applications Guide v1.0
(29 Jul 2025)

Placeholder for Securing Agentic AI Apps using OWASP Securing Agentic Applications Guide v1.0

Icon for article
Prompt Injection - OWASP Top 10 LLM
(18 Jul 2025)

Placeholder for Prompt Injection - OWASP Top 10 LLM

Icon for article
The Rise of Agentic AI and What It Means for Us
(07 Jul 2025)

Placeholder for The Rise of Agentic AI and What It Means for Us

Icon for article
OWASP Spotlight - Project 33 - OWASP FIASSE
(01 Jun 2025)

Icon for article
Do We Really Need Cybersecurity Certifications? Let’s Break It Down
(05 May 2025)

Placeholder for Do We Really Need Cybersecurity Certifications? Let’s Break It Down

Icon for article
Snyk Blog - My Journey at Black Hat Asia 2025
(15 Apr 2025)

Placeholder for Snyk Blog - My Journey at Black Hat Asia 2025

Icon for article
Black Hat Asia 2025: Reviewer, Speaker, and Community Connector
(07 Apr 2025)

Placeholder for Black Hat Asia 2025: Reviewer, Speaker, and Community Connector

Icon for article
OWASP Spotlight - Project 32 - OWASP AIVSS
(15 Mar 2025)

Icon for article
Times of India - It’s crucial for youngsters to be cyber aware: Experts
(19 Feb 2025)

Times of India - It’s crucial for youngsters to be cyber aware: Experts

Icon for article
Do not pass GO: Malicious package alert
(28 Jan 2025)

Placeholder for Do not pass GO: Malicious package alert

Icon for article
GovInfoSecurity - Artificial Intelligence Looms Large at Black Hat Europe 2024
(13 Dec 2024)

Placeholder for GovInfoSecurity - Artificial Intelligence Looms Large at Black Hat Europe 2024

Icon for article
OWASP Spotlight - Project 31 - OWASP WrongSecrets
(20 Nov 2024)

Icon for article
Cyber Leaders on the Move - Cyber Leadership Institute Feature
(01 Nov 2024)

Placeholder for Cyber Leaders on the Move - Cyber Leadership Institute Feature

Icon for article
Try Hack Me - Application Security Resources
(29 Sep 2024)

Placeholder for Try Hack Me - Application Security Resources

Icon for article
Women: Kickstart your Application Security Career
(12 Sep 2024)

Placeholder for Women: Kickstart your Application Security Career

Icon for article
How to integrate ASPM with your application security program
(14 Aug 2024)

Placeholder for How to integrate ASPM with your application security program

Icon for article
OWASP Spotlight - Project 27 - OWASP LLM
(15 Jun 2024)

Icon for article
Exploiting HTTP/2 CONTINUATION frames for DoS attacks
(10 Apr 2024)

Placeholder for Exploiting HTTP/2 CONTINUATION frames for DoS attacks

Icon for article
Let’s Chat Open Source Security
(27 Mar 2024)

Placeholder for Let's Chat Open Source Security

Icon for article
Raspberry Pi 5 - Single Board Computer
(05 Feb 2024)

Placeholder for Raspberry Pi 5 - Single Board Computer

Icon for article
MacBook Pro 14-inch M3 (2023)
(20 Jan 2024)

Placeholder for MacBook Pro 14-inch M3 (2023)

Icon for article
OWASP Spotlight - Project 30 - OWASP Developer Guide
(02 Jan 2024)

Icon for article
Gadgets & Devices
(01 Jan 2024)

Placeholder for Gadgets & Devices

Icon for article
Interests
(01 Jan 2024)

Placeholder for Interests

Icon for article
Implementing DevSecOps Practices
(22 Dec 2023)

Implementing DevSecOps Practices

Icon for article
BBC World - Women in cybersecurity
(18 Dec 2023)

BBC World - Women in cybersecurity

Icon for article
OWASP Spotlight - Project 29 - OWASP Domain Protect
(11 Oct 2023)

Icon for article
OWASP Spotlight - Project 28 - OWASP OpenCRE
(14 Sep 2023)

Icon for article
YubiKey 5 NFC - Hardware Security Key
(10 Sep 2023)

Placeholder for YubiKey 5 NFC - Hardware Security Key

Icon for article
Does GitOps enhance application security?
(21 Aug 2023)

Placeholder for Does GitOps enhance application security?

Icon for article
Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub
(22 Jun 2023)

Placeholder for Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub

Icon for article
Ethical hacking techniques
(05 Jun 2023)

Placeholder for Ethical hacking techniques

Icon for article
Ethical Hacking: Top Tools
(01 Jun 2023)

Placeholder for Ethical Hacking: Top Tools

Icon for article
Unlocking the power of multi-cloud security
(25 Apr 2023)

Placeholder for Unlocking the power of multi-cloud security

Icon for article
OWASP Spotlight - Project 26 - OWASP SamuraiWTF
(22 Mar 2023)

Icon for article
Securing the digital future: Reviewing the Biden-Harris administration’s National Cybersecurity Strategy
(20 Mar 2023)

Placeholder for Securing the digital future: Reviewing the Biden-Harris administration's National Cybersecurity Strategy

Icon for article
Supply chain security incident at CircleCI: Rotate your secrets
(07 Jan 2023)

Placeholder for Supply chain security incident at CircleCI: Rotate your secrets

Icon for article
SC Media - Contributor Profile
(01 Jan 2023)

Placeholder for SC Media - Contributor Profile

Icon for article
Key points from Google and Accenture’s ransomware white paper
(07 Nov 2022)

Placeholder for Key points from Google and Accenture's ransomware white paper

Icon for article
Update: OpenSSL high severity vulnerabilities
(03 Nov 2022)

Placeholder for Update: OpenSSL high severity vulnerabilities

Icon for article
New OpenSSL critical vulnerability: What you need to know
(31 Oct 2022)

Placeholder for New OpenSSL critical vulnerability: What you need to know

Icon for article
Looking back at Black Hat USA 2022
(21 Sep 2022)

Placeholder for Looking back at Black Hat USA 2022

Icon for article
OWASP Spotlight - Project 25 - OWASP Juice Shop
(27 Jul 2022)

Icon for article
OWASP Spotlight - Project 24 - OWASP Security Headers Project
(16 Jul 2022)

Icon for article
Interview: Women in Cyber and Open Source Security — Cyber Protection Magazine
(01 Jun 2022)

Placeholder for Interview: Women in Cyber and Open Source Security — Cyber Protection Magazine

Icon for article
Redgate 100 - Most Influential in the Database Community 2022
(01 Jun 2022)

Redgate 100 - Most Influential in the Database Community 2022

Icon for article
Lenovo ThinkPad T480 - Business Laptop
(15 May 2022)

Placeholder for Lenovo ThinkPad T480 - Business Laptop

Icon for article
Interview with ESG-global by Techtarget
(31 Mar 2022)

Icon for article
Women in Cybersecurity
(31 Mar 2022)

Placeholder for Women in Cybersecurity

Icon for article
How Snyk helps satisfy White House cybersecurity recommendations
(23 Mar 2022)

Placeholder for How Snyk helps satisfy White House cybersecurity recommendations

Icon for article
Business Standard - MIT Centre for Future Skills Excellence celebrates International Women’s Day
(10 Mar 2022)

Business Standard - MIT Centre for Future Skills Excellence celebrates International Women’s Day

Icon for article
Cyber Leadership Institute - Cyber Leaders on the Move: Vandana Verma
(01 Mar 2022)

Cyber Leadership Institute - Cyber Leaders on the Move: Vandana Verma

Icon for article
Della Leaders Club — Member, Pune Chapter
(01 Jan 2022)

Placeholder for Della Leaders Club — Member, Pune Chapter

Icon for article
Security Challenges in FinTech — Wallarm Researcher Corner
(01 Jan 2022)

Placeholder for Security Challenges in FinTech — Wallarm Researcher Corner

Icon for article
ISRM — Vandana Verma Re-Elected for OWASP Foundation Global Board
(15 Dec 2021)

Placeholder for ISRM — Vandana Verma Re-Elected for OWASP Foundation Global Board

Icon for article
OWASP Spotlight - Project 23 - OWASP VulnerableApp
(01 Dec 2021)

Icon for article
OWASP Spotlight - Project 22 - OWASP THREAT DRAGON
(02 Nov 2021)

Icon for article
OWASP Spotlight - Project 21 - OWASP CycloneDX
(18 Oct 2021)

Icon for article
Security Career Advice with Guy Podjarny
(17 Oct 2021)

Security Career Advice with Guy Podjarny

Icon for article
OWASP Spotlight - Project 20 - OWASP Security Pin
(20 Sep 2021)

Icon for article
I Had My Own Share Of Struggles But Learnt How To Survive And Stand Strong — Eat My News
(01 Sep 2021)

Placeholder for I Had My Own Share Of Struggles But Learnt How To Survive And Stand Strong — Eat My News

Icon for article
Pivoting from Different Field to Infosec - Hindi - Prabh Nair
(21 Jul 2021)

Icon for article
OWASP Spotlight - Project 19 - OWASP Application Security Verification standard (ASVS)
(18 Jul 2021)

Icon for article
Bugbounty vs CTF in Hindi with Prabh Nair
(07 Jul 2021)

Icon for article
How to Get Into Infosec - Hindi - Prabh Nair
(23 Jun 2021)

Icon for article
How to Teach Information Security to 10 Year Old - Prabh Nair
(09 Jun 2021)

Icon for article
OWASP Spotlight - Project 18 - OWASP DSOMM
(03 Jun 2021)

Icon for article
ISRM — Vandana Verma Named as Risky Woman to Watch
(01 Jun 2021)

Placeholder for ISRM — Vandana Verma Named as Risky Woman to Watch

Icon for article
A Day In The Life Of a SOC Manager - Avinash Shet
(26 May 2021)

Icon for article
OWASP Spotlight - Project 17 - Education and Training Committee
(22 May 2021)

Icon for article
Consumer identities in Modern Digital World (CIAM)
(17 May 2021)

Placeholder for Consumer identities in Modern Digital World (CIAM)

Icon for article
What It Takes To Be a SOC Analyst - Avinash Shet
(12 May 2021)

Icon for article
Defining KPIs in SOC
(28 Apr 2021)

Icon for article
OWASP Spotlight - Project 16 - Cornucopia
(27 Apr 2021)

Icon for article
OWASP Spotlight - Project 15 - Dependency Track
(18 Apr 2021)

Icon for article
Getting into Cloud Security with Lalit
(14 Apr 2021)

Icon for article
OWASP Spotlight - Project 14 - Secure Coding Dojo
(12 Apr 2021)

Icon for article
OWASP Spotlight - Project 13 - Mobile Security Testing Guide
(04 Apr 2021)

Icon for article
Breaking Into InfoSec - A Day in the Life of a Security Consultant
(31 Mar 2021)

Icon for article
Breaking into Web App Pen-testing - Gabrielle
(17 Mar 2021)

Icon for article
Interview with CISO MAG
(05 Mar 2021)

Placeholder for Interview with CISO MAG

Icon for article
Celebrate ‘You’ - Be relentless, fearless, voice out!
(04 Mar 2021)

Celebrate ‘You’ - Be relentless, fearless, voice out!

Icon for article
Breaking into Offensive Security - Phillip Wiley
(03 Mar 2021)

Icon for article
OWASP Spotlight - Project 12 - Zed Attack Proxy (ZAP)
(27 Feb 2021)

Icon for article
Pivoting Career in Cybersecurity - Vickie Li
(17 Feb 2021)

Icon for article
2021 LENS INTO CYBERSECURITY TRENDS
(11 Feb 2021)

2021 LENS INTO CYBERSECURITY TRENDS

Icon for article
Breaking into Web App Hacking - Farah Hawa
(03 Feb 2021)

Icon for article
INSPIRE 20 Leadership Podcast
(25 Jan 2021)

INSPIRE 20 Leadership Podcast

Icon for article
Cyber Talk with Jay Hira
(20 Jan 2021)

Icon for article
Cyber Security 2021 Prediction
(15 Jan 2021)

Placeholder for Cyber Security 2021 Prediction

Icon for article
OWASP Spotlight - Project 11 - Nettacker
(15 Jan 2021)

Icon for article
Breaking into DevSecOps with Clint Gibler
(06 Jan 2021)

Icon for article
OWASP Spotlight - Project 10 - Top10
(05 Jan 2021)

Icon for article
OWASP Spotlight - Project 9 - Software Assurance Maturity Model (SAMM)
(26 Dec 2020)

Icon for article
Breaking Into Vulnerability Assessment - Chintan Gurjar
(16 Dec 2020)

Icon for article
OWASP Spotlight - Project 8 - Proactive Controls
(13 Dec 2020)

Icon for article
OWASP Spotlight - Project 7 - Security Knowledge Framework
(06 Dec 2020)

Icon for article
Breaking into Threat Modeling with Adam Shostack
(02 Dec 2020)

Icon for article
Broadening the diversity aperture
(26 Nov 2020)

Placeholder for Broadening the diversity aperture

Icon for article
Featured in TimesofIndia
(25 Nov 2020)

Placeholder for Featured in TimesofIndia

Icon for article
OWASP Spotlight - Project 6 - PyTM
(24 Nov 2020)

Icon for article
Human Factor Security Interview with Vandana Verma
(20 Nov 2020)

Icon for article
Breaking into Cloud Security with Ashish Rajan
(18 Nov 2020)

Icon for article
OWASP Spotlight - Project 5 - SecurityRAT
(14 Nov 2020)

Icon for article
OWASP Spotlight - Project 4 - Cheat Sheet Series
(07 Nov 2020)

Icon for article
Breaking into Red Teaming with Abhijith BR
(04 Nov 2020)

Icon for article
OWASP Spotlight - Project 3 - Core Rule Set (CRS)
(31 Oct 2020)

Icon for article
Inspiring Leaders at IBM India
(28 Oct 2020)

Placeholder for Inspiring Leaders at IBM India

Icon for article
Epic Women in Cyber — Vandana Verma
(27 Oct 2020)

Placeholder for Epic Women in Cyber — Vandana Verma

Icon for article
Breaking into Bug Bounty Hunting with Nikhil Srivastava
(21 Oct 2020)

Icon for article
OWASP Spotlight - Project 2 - Dependency Check
(21 Oct 2020)

Icon for article
Integration Reciepe : IBM IGI with IBM Security Verify
(11 Oct 2020)

Integration Reciepe : IBM IGI with IBM Security Verify

Icon for article
OWASP Spotlight - Project 1 - Web Security Testing Guide
(10 Oct 2020)

Icon for article
Breaking into Security/Developer Relations - Developersteve
(07 Oct 2020)

Icon for article
Interview with Cybersecurity Magazine
(25 Sep 2020)

Placeholder for Interview with Cybersecurity Magazine

Icon for article
Burnout In BugBounty in Hindi - Prabh Nair
(23 Sep 2020)

Icon for article
Recruiting Trends with Jaskaran Kohli
(09 Sep 2020)

Icon for article
Breaking into Application Security with Rob Cuddy
(26 Aug 2020)

Icon for article
Running an AppSec Program with Open Source (OWASP) Projects
(14 Aug 2020)

Placeholder for Running an AppSec Program with Open Source (OWASP) Projects

Icon for article
How to be an InfoSec Speaker
(12 Aug 2020)

Icon for article
Interview with Dark Reading
(05 Aug 2020)

Placeholder for Interview with Dark Reading

Icon for article
Passionate guide for the web application security journey
(05 Aug 2020)

Placeholder for Passionate guide for the web application security journey

Icon for article
Getting into Cyber
(29 Jul 2020)

Icon for article
Interview with PortSwigger
(16 Jul 2020)

Placeholder for Interview with PortSwigger

Icon for article
Cyber Security Basics
(15 Jun 2020)

Icon for article
Zero Trust:Trust no one, Verify everyone
(15 Jun 2020)

Zero Trust:Trust no one, Verify everyone

Icon for article
Times of India - Bug report: The female hackers keeping your WFH systems safe
(26 May 2020)

Times of India - Bug report: The female hackers keeping your WFH systems safe

Icon for article
Times of India - Bug report: The female hackers keeping your work from home systems safe
(25 May 2020)

Times of India - Bug report: The female hackers keeping your work from home systems safe

Icon for article
Republic World — Expert Quote: Significant Increase in Cybercrime Against Women During Lockdown
(15 May 2020)

Placeholder for Republic World — Expert Quote: Significant Increase in Cybercrime Against Women During Lockdown

Icon for article
Security Approaches Post Lockdown
(14 May 2020)

Security Approaches Post Lockdown

Icon for article
Hindustan Times - Significant increase in cybercrime against women during lockdown: Experts
(03 May 2020)

Hindustan Times - Significant increase in cybercrime against women during lockdown: Experts

Icon for article
Business Standard - Significant increase in cybercrime against women during lockdown: Experts
(01 May 2020)

Business Standard - Significant increase in cybercrime against women during lockdown: Experts

Icon for article
ETCISO - Significant increase in cybercrime against women during lockdown: Experts
(01 May 2020)

ETCISO - Significant increase in cybercrime against women during lockdown: Experts

Icon for article
NDTV - Significant increase in cyber crimes against women during lockdown: Experts
(01 May 2020)

NDTV - Significant increase in cyber crimes against women during lockdown: Experts

Icon for article
Un-desireable. Un-imaginable. Un-thinkable. We still have the capacity to out beat the threats to your privacy.
(01 May 2020)

Un-desireable. Un-imaginable. Un-thinkable. We still have the capacity to out beat the threats to your privacy.

Icon for article
My Manifestation of InfoSec Speaking
(17 Mar 2020)

My Manifestation of InfoSec Speaking

Icon for article
My Exhilarating InfoSec Journey
(10 Mar 2020)

My Exhilarating InfoSec Journey

Icon for article
Interview with CISO MAG
(08 Mar 2020)

Placeholder for Interview with CISO MAG

Icon for article
A colloquy with Vandana Verma by Sr.Reflectionist Bishakha Jain
(27 Feb 2020)

Placeholder for A colloquy with Vandana Verma by Sr.Reflectionist Bishakha Jain

Icon for article
A Colloquy with Vandana Verma — Reflections Magazine (SCIT)
(01 Jan 2020)

Placeholder for A Colloquy with Vandana Verma — Reflections Magazine (SCIT)

Icon for article
ETCISO - Security Summit Virtual
(01 Jan 2020)

ETCISO - Security Summit Virtual

Icon for article
Interview with ITSP Magazine
(10 Sep 2019)

Placeholder for Interview with ITSP Magazine

Icon for article
Bug Bounty World Interviews Vandana Verma
(11 May 2019)

Icon for article
Rise of Cyber Woman
(11 May 2019)

Rise of Cyber Woman

Icon for article
HackInterview with Vandana
(11 Mar 2019)

Placeholder for HackInterview with Vandana

Icon for article
BLOG POSTS
(01 Jan 2000)

Placeholder for BLOG POSTS

Icon for article
Books Authored
(01 Jan 2000)

Placeholder for Books Authored

Icon for article
Home Labs
(01 Jan 2000)

Placeholder for Home Labs

Icon for article
Learning & Resources
(01 Jan 2000)

Placeholder for Learning & Resources

Icon for article
Media & Stories
(01 Jan 2000)

Placeholder for Media & Stories

Icon for article
Open Source
(01 Jan 2000)

Placeholder for Open Source

Icon for article
Work With Vandana
(01 Jan 2000)

Placeholder for Work With Vandana