![](https://dt-cdn.net/images/wave-half-left-1920-a5c903653b.jpg)
Nirmeet Bhogill's articles
![The state of application security 2024](https://dt-cdn.net/wp-content/uploads/2024/07/BAE12016_RC_CISO-2024_1600x900_FINAL-300x169.jpg)
![](https://dt-cdn.net/wp-content/uploads/2024/06/smart-female-it-programe-300x169.jpg)
What is security analytics?
![RSA guide, DevSecOps transformation and vulnerability management](https://dt-cdn.net/wp-content/uploads/2022/05/17619_RC_BlogImage_RSA-Guide_800x450_FINAL-300x169.jpg)
RSA guide 2024: AI and security are top concerns for organizations in every industry
![Application Security Product Notes; VMware Aria Operations for Logs](https://dt-cdn.net/wp-content/uploads/2023/05/AppSec_ProductNotes_v1-300x169.png)
What the NIS2 Directive means for application security
![Application Security, Crowdstrike BSOD](https://dt-cdn.net/wp-content/uploads/2023/06/RC_AppSec_800x450_FINAL-300x169.png)
What the SEC cybersecurity disclosure mandate means for application security
![Application Security Product Notes; VMware Aria Operations for Logs](https://dt-cdn.net/wp-content/uploads/2023/05/AppSec_ProductNotes_v1-300x169.png)
Cybersecurity Awareness Month 2023: Key themes and best practices for protecting against cyberthreats
![](https://dt-cdn.net/wp-content/uploads/2023/06/businessman-hand-showing-300x169.jpg)
What is cloud application security?
![log analytics log output for log management best practices](https://dt-cdn.net/wp-content/uploads/2021/11/log-output-300x169.jpg)
Log auditing and log forensics benefit from converging observability and security data
![System Security Specialist Working at System Control Center evaluates synthetic monitoring vs. real user monitoring, zero-day attacks, vulnerability management, cybersecurity awareness month, cybersecurity best practices, Apache Commons Text vulnerability](https://dt-cdn.net/wp-content/uploads/2022/06/system-security-speciali-300x169.jpg)
Cybersecurity Awareness Month: Essential cybersecurity best practices to safeguard your organization
![System Security Specialist Working at System Control Center evaluates synthetic monitoring vs. real user monitoring, zero-day attacks, vulnerability management, cybersecurity awareness month, cybersecurity best practices, Apache Commons Text vulnerability](https://dt-cdn.net/wp-content/uploads/2022/06/system-security-speciali-300x169.jpg)
What is vulnerability management? And why runtime vulnerability detection makes the difference
![DevSecOps, vulnerability management, DevSecOps automation, application security](https://dt-cdn.net/wp-content/uploads/2022/05/DevSecOps-1-300x169.jpg)
DevSecOps automation improves application security in multicloud environments
![Dynatrace Application Security detects and blocks attacks automatically in real-time](https://dt-cdn.net/wp-content/uploads/2022/02/ApPSec-PR-300x169.jpg)
Protect your organization against zero-day vulnerabilities
![Critical IT operations at risk: The blame game and siloed tools take a toll](https://dt-cdn.net/wp-content/uploads/2021/09/devops-software-developm-300x169.jpg)