Equifax Breach Year in Review: Vulnerabilities in Apache Struts Still Going Strong
Equifax breach review reveals vulnerabilities in Apache Struts are still unpatched by many companies. Learn why remediation is crucial.
Zombies: Top 5 Open Source Vulnerabilities That Refuse To Die
Discover the top 5 open source vulnerabilities that still haunt developers. Learn how to protect your applications from security threats.
6 Open Source Software Security Concerns Dispelled
Discover and dispel 6 common concerns around using open source software in applications. Learn how to mitigate risks and harness its power.
CVSS v3 Is Still Missing The Target For Prioritization
Learn about the flaws in the Common Vulnerability Scoring System and how it may impact security professionals.
Vulnerability Disclosure: Find the Bugs in Your Code Before the Hackers Do
Learn about vulnerability disclosure and how to find bugs in your code before hackers do.
You Can’t Ignore Using Components With Known Vulnerabilities
Learn why using components with known vulnerabilities is a major issue in application security and how to address it with OWASP guidelines.
Known Open Source Vulnerabilities in Reusable Software Components: a Golden Goose For Hackers
Discover the risks of known open source vulnerabilities in reusable software components and how hackers exploit them.
CVSS v3 Creates New Challenges For Developers
Learn about CVSS v3 and the challenges it brings for developers. Understand how to prioritize remediations & utilize effective usage analysis.
Top 3 Challenges to Fintech in a Post-Equifax World
Discover the top 3 challenges for fintech in the post-Equifax era: stringent regulations, securing customer trust, and application security.
The Equifax Hack: 6 Months Later, What Did We Learn?
The Equifax breach was the largest single breach in history, with 145.5 million records being uncovered. Today, 6 months later, we look at the industry and see what we have learned from Equifax.
Top 5 New Open Source Vulnerabilities in March 2018
The top 5 new open source vulnerabilities in March 2018, including Drupal, Microsoft ChakraCore, Jackson-databind, Moment.js, and Marked.js.
Top 15 Security Experts to Follow on Twitter
Discover the top 15 security experts to follow on Twitter for the latest updates on application security. Engage with thought leaders.
The Equifax Breach: Who’s to Blame?
Learn about the Equifax data breach, who's to blame, and the importance of staying on top of open source libraries and vulnerabilities.
What Risks Does Serverless Computing Pose to Your Application Security?
Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.
Leveraging AI for Open Source Management
Discover how AI is revolutionizing open source software management. Learn how automated solutions can help track, detect, and mitigate.
3 Million Reasons Bug Bounty Programs are a Win-Win
Explore how bug bounty programs offer a win-win for cybersecurity, enabling companies to leverage global talent for robust app security.