Bigger Data, Bigger Problems: Three Major Challenges in Big Data Security
Discover the challenges of big data security: data sources, infrastructure, and technology issues, and how to keep your big data secure.
SAST – All About Static Application Security Testing
Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.
Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code
Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.
Quick Guide to Popular AI Licenses
Not all "open" AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.
NVD Update: Help Has Arrived
There's hope yet for the world's most beleaguered vulnerability database.
Responsible AI Licenses (RAIL): Here’s What You Need to Know
Learn about this family of licenses that seek to limit harmful use of AI models.
NVD Update: More Problems, More Letters, Some Questions Answered
We're not saying the NVD is dead but it's not looking good.
Mend.io and Sysdig Launch Joint Solution for Container Security
Learn how the Mend.io and Sysdig integration boosts container security by combining runtime insights and vulnerability prioritization.
How Do I Protect My AI Model?
Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices
Quick Guide to the OWASP OSS Risk Top 10
Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.
Why an SBOM Audit is Vital to Application Security and Compliance
Learn the importance of an SBOM for enhancing application security and compliance. Explore best practices for creating and auditing SBOMs effectively.
What Makes Containers Vulnerable?
Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.
NVD’s Backlog Triggers Public Response from Cybersec Leaders
The National Vulnerability Database's backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress
OWASP Top 10 for LLM Applications: A Quick Guide
Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.
What You Need to Know About Hugging Face
Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.
Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise 1
Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.