There’s a New Stealer Variant in Town, and It’s Using Electron to Stay Fully Undetected
Tom Abai, August 10, 2023
A New Version of Mend for Containers is Here
Jeanette Sherman, August 9, 2023
Top Ten Tips to Choose a Great SAST Tool
Adam Murray, August 3, 2023
What Risks Do You Run from Brandjacking, and How Do You Overcome Them?
Adam Murray, August 1, 2023
What Cybersecurity Risks Does Typosquatting Pose, and How Can You Beat Them?
Adam Murray, July 27, 2023
The New Era of AI-Powered Application Security. Part Three: How Can Application Security Cope With The Challenges Posed by AI?
Rami Elron, July 25, 2023
Why is Software Vulnerability Patching Crucial for Your Software and Application Security?
Adam Murray, July 20, 2023
The New Era of AI-Powered Application Security. Part Two: AI Security Vulnerability and Risk
Rami Elron, July 18, 2023
Software Supply Chain Compliance: Ensuring Security and Trust in Your Software and Applications
Adam Murray, July 13, 2023
The New Era of AI-Powered Application Security. Part One: AI-Powered Application Security: Evolution or Revolution?
Rami Elron, July 11, 2023
How Does SLSA Help Strengthen Software Supply Chain Security?
Adam Murray, July 7, 2023
Why You Should Avoid Copy and Paste Code
Adam Murray, July 5, 2023