Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
Azure DevOps Services – Security Checklist
Control access, visibility, protect repositories, review audit logs, implement WAFs, with our Azure DevOps security checklist.
When to Consider a NoSQL vs Relational Database
Learn when to consider using a NoSQL vs relational database in your org. Understand the benefits & where NoSQL may be the better option.
npm: How To Install A Specific Version of Node.js Package
Learn how to install a specific version of a Node.js package using npm, & check versions, install older versions, & use semantic versioning.
RASP: The What, Why and How
Explore the world of RASP - Runtime Application Self-Protection in this informative blog post. Learn why developers need it.
Serverless Security Explained
Learn about serverless security in the cloud ecosystem, including best practices like staying up to date, least privilege, and more.
Top 3 Open Source Risks and How to Beat Them
Discover the top 3 open source risks: security vulnerabilities, licensing compliance, and quality issues. Learn how to mitigate these risks.
Gray Box Testing Guide
Discover the comprehensive guide to gray box testing, a blend of black and white box methods, to enhance your application's security.
What Are Docker Containers, and Should Your Company Adopt It?
Learn about Docker containers and whether your company should adopt them. Discover the benefits, challenges, and security considerations.
Microservices Architecture: Security Strategies and Best Practices
Learn about microservices architecture and the security strategies and best practices needed to protect your organization's systems.
API Security in a Digitally Transformed World
Learn about API security. Understand the importance of securing APIs and the best practices to protect your organization.
White Hat Hacking – Not What You Expect
Discover the world of white hat hacking and the importance of ethical hackers in open source projects.
How to Set Up an Open Source Strategy
Learn how to set up an open source strategy for your software development org. Understand the key considerations, and implementation steps..
CVE (Common Vulnerabilities and Exposures) — What is it and how to understand it
What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?
The 10 Best Security Conferences to Attend in 2021
Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.
Top 10 Open Source Vulnerabilities In 2020
Discover the top 10 open source vulnerabilities in 2020, including Lodash, Jackson-databind, HtmlUnit, and more.
What You Need To Know About Application Security Testing Orchestration
Discover the importance of Appsec Testing Orchestration in the evolving security threat landscape. Learn how to manage tools effectively.
Join our subscriber list to get the latest news and updates
Thanks for signing up!