A quick guide to the Known Exploited Vulnerabilities (KEV) catalog.
Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.
Learn more about how organizations can use open source software to innovate while minimizing risk.
Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.
Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates.
Keeping dependencies up to date is a big part of dependency management, but it’s not everything. Learn more about the differences between the two.
Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.
Not all “open” AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.
Learn more about supply chain threats and where to find them.
Learn about this family of licenses that seek to limit harmful use of AI models.
We’re not saying the NVD is dead but it’s not looking good.
Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices
Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.
Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.
Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.
Learn about AI gender bias in large language models, how historical data impacts AI, & implications for women in health & car safety fields.
Join our subscriber list to get the latest news and updates
Thanks for signing up!