Blog Jeff Martin

Top Ten Tips to Choose a Great SAST Tool - Jeff Martin
Jeff Martin

Jeff has spent over 15 years in Product roles helping both the organizations he worked for and their customers transform and measure their business processes, development, and QA. He especially enjoys cultural and mindset transformations for their ability to create lasting progress.
Top Ten Tips to Choose a Great SAST Tool - Blog image Top Ten Tips to Choose a Great SAST Tool@2x

Top Ten Tips to Choose a Great SAST Tool

The top ten tips for choosing a SAST tool for application security. Integration, automation, and scalability are key factors to consider.

Read More
Top Ten Tips to Choose a Great SAST Tool - Broken NVD 1

NVD Update: Help Has Arrived

There's hope yet for the world's most beleaguered vulnerability database.

Read More
Top Ten Tips to Choose a Great SAST Tool - nvd backlog triggers public response from cybersec leaders

NVD’s Backlog Triggers Public Response from Cybersec Leaders

The National Vulnerability Database's backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress

Read More
Top Ten Tips to Choose a Great SAST Tool - hugging face blog

What You Need to Know About Hugging Face

Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.

Read More
Top Ten Tips to Choose a Great SAST Tool - secrets management vs secrets detection what you need to know

Secrets Management vs Secrets Detection: Here’s What You Need to Know

Learn about the importance of secrets management vs secrets detection in application security. Protect your sensitive data.

Read More
Top Ten Tips to Choose a Great SAST Tool - challenges for license compliance and copyright with AI

The Challenges for License Compliance and Copyright with AI

Discover the challenges of license compliance and copyright with AI-generated code in software development. Learn about legal risks.

Read More
Top Ten Tips to Choose a Great SAST Tool - death in the sdlc

Let’s Embrace Death in the Software Development Lifecycle

Learn why it's important to let software products die gracefully rather than become zombies, affecting security and functionality over time.

Read More
Top Ten Tips to Choose a Great SAST Tool - what you can do to stop software supply chain attacks post

What You Can Do to Stop Software Supply Chain Attacks

Learn how to stop software supply chain attacks with SBOMs, best practices, and prioritizing known vulnerabilities. Protect your software.

Read More
Top Ten Tips to Choose a Great SAST Tool - how software supply chain attacks work and how to assess your software supply chain security

How Software Supply Chain Attacks Work, and How to Assess Your Software Supply Chain Security

Learn how software supply chain attacks work and how to to defend against malicious packages and data breaches.

Read More
Top Ten Tips to Choose a Great SAST Tool - CVSS 4.0 whats new e1687453756567

CVSS 4.0 — What’s New?

Learn about the new features and improvements in CVSS 4.0, the Common Vulnerability Scoring System. Understand how to use it.

Read More
Top Ten Tips to Choose a Great SAST Tool - understanding the anatomy of a malicious package attack

Understanding the Anatomy of a Malicious Package Attack

Learn to protect your applications from malicious packages with our guide. Understand the anatomy of attacks and how to prevent them.

Read More
Top Ten Tips to Choose a Great SAST Tool - whats driving the adoption of sboms and whats

What’s Driving the Adoption of SBOMs? What’s Next for Them?

Discover what's driving the adoption of SBOMs and what's next for them in terms of malicious packages and supply chain security.

Read More
Top Ten Tips to Choose a Great SAST Tool - blog a guide to standard SBOM formats

SBOM Standard Formats: Guide

Discover the importance of Software Bill of Materials (SBOM) and compare the three main formats - SPDX, CycloneDX, and SWID.

Read More
Top Ten Tips to Choose a Great SAST Tool - shift to the cloud and implications for application security

The Shift to the Cloud and its Implications for Application Security

Learn about the implications of shifting applications to the cloud on application security. Understand the shared responsibility.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!