Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
Top 5 New Open Source Vulnerabilities in March 2018
The top 5 new open source vulnerabilities in March 2018, including Drupal, Microsoft ChakraCore, Jackson-databind, Moment.js, and Marked.js.
Top 15 Security Experts to Follow on Twitter
Discover the top 15 security experts to follow on Twitter for the latest updates on application security. Engage with thought leaders.
The Equifax Breach: Who’s to Blame?
Learn about the Equifax data breach, who's to blame, and the importance of staying on top of open source libraries and vulnerabilities.
What Risks Does Serverless Computing Pose to Your Application Security?
Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.
Leveraging AI for Open Source Management
Discover how AI is revolutionizing open source software management. Learn how automated solutions can help track, detect, and mitigate.
3 Million Reasons Bug Bounty Programs are a Win-Win
Explore how bug bounty programs offer a win-win for cybersecurity, enabling companies to leverage global talent for robust app security.
5 (Practical) Tips to Help You Secure Your Single Page Application
What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...
Are You Using One of the Top 6 Most Vulnerable Open Source Projects?
Discover the top six vulnerable open source projects, including Apache Tomcat and Struts2, and learn why updating these components is crucial.
An Apache Struts Vulnerability You Really Need to Fix
Discover the latest Apache Struts vulnerability & how it can impact your application security. Learn how to fix it and protect your apps.
Back To Heartbleed. Three Years Later.
Explore the aftermath of Heartbleed, and the importance of managing open source components for security.
Dirty Cow Vulnerability Puts All Linux and Android Distributions at Risk
Learn about the Dirty Cow vulnerability impacting Linux and Android distributions. Find out who's affected, how to protect yourself.
Critical MySQL Database Vulnerability Puts Your Data at Risk
Critical MySQL database vulnerability puts your data at risk. Learn about its specifications, and steps for remediation and mitigation.
What You Don’t Know About Android Application Security…
Discover the latest in Android application security threats and solutions. Learn how to protect yourself and your users from potential risks.
Using Java? This is The Next Heartbleed You Should Be Worried About
Learn about the latest Java vulnerability that could be the next Heartbleed. Find out how to protect your Java-based applications.
Are All Bugs Shallow? Questioning Linus’s Law
Explore the questioning of Linus's Law in open source projects and the impact on vulnerabilities, & managing your open source components
Application Lifecycle Management — 5 Common Pitfalls to Avoid
Learn how to avoid common pitfalls in Application Lifecycle Management (ALM) to ensure project success.