Guides
Protect AI models, data, and systems
Test for behavioral risks in conversational AI
Mitigating risks and future trends
AppSec types, tools, and best practices
Automating dependency updates
Manage open source code
Keep source code safe
Improve transparency, security, and compliance
Pre-production scanning and runtime protection
Secure containerized applications
16 Women Paving the Way in AppSec
Discover 16 women leaders in the field of Application Security who are paving the way for progress and innovation.
Security Advisories Play a Critical Role in Keeping Our Software Safe
Learn about security advisories. Discover popular advisories like Microsoft Security, National Vulnerability Database, and Apache Security.
Experience over Best Practices- Interview with CyberArk’s WhiteHat Hacker Len Noe
Interview with CyberArk’s WhiteHat Hacker Len Noe. Learn how hackers switch to become white hat hackers for the public good.
Top 15 Security Experts to Follow on Twitter
Discover the top 15 security experts to follow on Twitter for the latest updates on application security. Engage with thought leaders.
What Risks Does Serverless Computing Pose to Your Application Security?
Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.
3 Million Reasons Bug Bounty Programs are a Win-Win
Explore how bug bounty programs offer a win-win for cybersecurity, enabling companies to leverage global talent for robust app security.
5 (Practical) Tips to Help You Secure Your Single Page Application
What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as...
MISRA and ISO 26262: Compliance Is Key to Security
Discover the importance of compliance with MISRA and ISO 26262 standards for security in the transportation industry.
Critical MySQL Database Vulnerability Puts Your Data at Risk
Critical MySQL database vulnerability puts your data at risk. Learn about its specifications, and steps for remediation and mitigation.
What You Don’t Know About Android Application Security…
Discover the latest in Android application security threats and solutions. Learn how to protect yourself and your users from potential risks.
Application Lifecycle Management — 5 Common Pitfalls to Avoid
Learn how to avoid common pitfalls in Application Lifecycle Management (ALM) to ensure project success.
Never miss a post. Opt-out at any time.
You’re all set to receive our latest posts.
Map your maturity against the global standards. Receive a personalized readiness report in under 5 minutes.