Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
White Hat Hacking – Not What You Expect
Discover the world of white hat hacking and the importance of ethical hackers in open source projects.
CVE (Common Vulnerabilities and Exposures) — What is it and how to understand it
What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?
The 10 Best Security Conferences to Attend in 2021
Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.
Top 10 Open Source Vulnerabilities In 2020
Discover the top 10 open source vulnerabilities in 2020, including Lodash, Jackson-databind, HtmlUnit, and more.
What You Need To Know About Application Security Testing Orchestration
Discover the importance of Appsec Testing Orchestration in the evolving security threat landscape. Learn how to manage tools effectively.
Apache Struts Vulnerabilities Pose ‘Stay or Go’ Question
Stay informed about the latest Apache Struts vulnerabilities and the ongoing debate of whether to continue using the framework or migrate off it.
What Is CVSS v3.1? Understanding The New CVSS
Learn about the Common Vulnerability Scoring System (CVSS) v3.1 & how it measures severity, not risk, in assessing security vulnerabilities.
White Box Testing Guide
Learn about White Box Testing in software development with this comprehensive guide. Understand the types, techniques, tools, advantages.
SCA vs SBOM: Getting Started With Software Composition Analysis
Top tips for starting with a software composition analysis solution. Build a team, set goals beyond scanning, understand the data model, make policies work, start small.
Be Wise — Prioritize: Software Security Vulnerability Prioritization
Learn how to prioritize software security vulnerabilities effectively to ensure your team is addressing the most urgent threats first.
Black Box Testing: What You Need to Know
Learn all about black box testing in application security & quality assurance. Discover techniques, & tools and more.
Choosing the Right SCA Solution: 7 Questions That Actually Matter
Discover the top 7 questions to ask when evaluating a Software Composition Analysis solution for managing open source components.
Top 9 Code Review Tools for Clean and Secure Source Code
Discover the top 9 code review tools for clean and secure source code, essential for detecting errors and defects before production.
Open Source Vulnerability Databases
Discover the top open source vulnerability databases beyond NVD. Learn how to track and remediate vulnerabilities in your software.
Why You Need an Open Source Vulnerability Scanner
Learn why you need an open source vulnerability scanner to protect your applications from cyber attacks.
The SaaS Loophole in GPL Open Source Licenses
Discover the SaaS loophole in GPL open source licenses and how it affects software distribution. Learn about the AGPL solution.