Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
Bigger Data, Bigger Problems: Three Major Challenges in Big Data Security
Discover the challenges of big data security: data sources, infrastructure, and technology issues, and how to keep your big data secure.
SAST – All About Static Application Security Testing
Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.
Dependency Management: Protecting Your Code
Learn how to protect your application’s code with dependency management.
More than 100K sites impacted by Polyfill supply chain attack
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.
Dependency Management vs Dependency Updates: What’s the Difference?
Keeping dependencies up to date is a big part of dependency management, but it's not everything. Learn more about the differences between the two.
Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code
Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.
In Modern AppSec, DevSecOps Demands Cultural Change
Learn about the cultural change needed for DevSecOps in modern AppSec. Discover how collaboration and innovation can improve security.
Quick Guide to Popular AI Licenses
Not all "open" AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.
NVD Update: Help Has Arrived
There's hope yet for the world's most beleaguered vulnerability database.
Threat Hunting 101: Five Common Threats to Look For
Learn more about supply chain threats and where to find them.
Responsible AI Licenses (RAIL): Here’s What You Need to Know
Learn about this family of licenses that seek to limit harmful use of AI models.
NVD Update: More Problems, More Letters, Some Questions Answered
We're not saying the NVD is dead but it's not looking good.
Getting Started with Software Dependency Management
Discover the benefits of keeping your software dependencies up-to-date. Learn how to manage dependencies effectively.
Mend.io and Sysdig Launch Joint Solution for Container Security
Learn how the Mend.io and Sysdig integration boosts container security by combining runtime insights and vulnerability prioritization.
How Do I Protect My AI Model?
Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices
Quick Guide to the OWASP OSS Risk Top 10
Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.
Never miss a post. Opt-out at any time.
You’re all set to receive our latest posts.
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.