Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
NIST 800-171 Sets New Standards for CUI Data Protection
Learn about NIST 800-171 standards for protecting Controlled Unclassified Information (CUI) and how they impact contractors.
Open Source vs. Free Software — What is The Difference?
Explore the difference between open source and free software in the tech industry. Learn about the origins, philosophies, and implications.
How to Navigate Migrating to Cloud in a Regulated Environment
Learn strategies for compliance, risk management, and secure cloud adoption in financial and healthcare sectors.
Facebook React Finally Relicensed Under MIT Open Source License
Facebook React has been relicensed under the MIT Open Source License, replacing the controversial BSD + Patents license.
The Equifax Breach: Who’s to Blame?
Learn about the Equifax data breach, who's to blame, and the importance of staying on top of open source libraries and vulnerabilities.
What Risks Does Serverless Computing Pose to Your Application Security?
Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.
6 Reasons Serverless Computing Can Take the Cloud to the Next Level
Learn 6 key benefits, including scalability, cost efficiency, and multi-language support in serverless computing and the cloud industry.
Leveraging AI for Open Source Management
Discover how AI is revolutionizing open source software management. Learn how automated solutions can help track, detect, and mitigate.
3 Million Reasons Bug Bounty Programs are a Win-Win
Explore how bug bounty programs offer a win-win for cybersecurity, enabling companies to leverage global talent for robust app security.
5 (Practical) Tips to Help You Secure Your Single Page Application
What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...
Are You Using One of the Top 6 Most Vulnerable Open Source Projects?
Discover the top six vulnerable open source projects, including Apache Tomcat and Struts2, and learn why updating these components is crucial.
Comprehensive Comparison of Continuous Integration Tools
Explore a comprehensive comparison of popular Continuous Integration tools like Jenkins, TeamCity, Bamboo, Travis CI, and Microsoft TFS/VSTS.
Crowdsourcing and Open Source – Friends or Foes?
Dive into the debate on crowdsourcing and open source. Understand their differences, similarities, and how they both leverage community wisdom
MISRA and ISO 26262: Compliance Is Key to Security
Discover the importance of compliance with MISRA and ISO 26262 standards for security in the transportation industry.
An Apache Struts Vulnerability You Really Need to Fix
Discover the latest Apache Struts vulnerability & how it can impact your application security. Learn how to fix it and protect your apps.
Back To Heartbleed. Three Years Later.
Explore the aftermath of Heartbleed, and the importance of managing open source components for security.
Join our subscriber list to get the latest news and updates
Thanks for signing up!