A Guide to Open Source Software
Learn more about how organizations can use open source software to innovate while minimizing risk.
Read about application security, DevSecOps, license compliance, and software supply chain security.
Learn more about how organizations can use open source software to innovate while minimizing risk.
This webinar offers insight on how to protect your application source code from data exposures and theft.
Join us to learn innovative techniques for analyzing and improving the security posture of container images using reachability analysis.
Static Application Security Testing (SAST) is a central part of application security efforts, so let’s get into the whats and whys behind this technology.
Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates.
In this panel discussion, learn how to identify, assess, and prioritize the risk of an attacker exploiting the latest vulns in your systems.
Learn how to build high-performing AppSec teams, gain executive buy-in, and create a sustainable security program.
The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.
Keeping dependencies up to date is a big part of dependency management, but it's not everything. Learn more about the differences between the two.
Discover the latest Forrester research on the Software Composition Analysis Software Landscape, Q2 2024.
Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.
Explore the challenges encountered in securing software applications and unlock the potential of Static Application Security Testing (SAST).
Not all "open" AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.
There's hope yet for the world's most beleaguered vulnerability database.
Discover innovative strategies and best practices to safeguard your containerized applications in a constantly changing threat landscape.
Learn more about supply chain threats and where to find them.
Learn how to integrate multiple platforms and technologies to ensure zero-trust policies are enforced from the endpoint to the cloud and everywhere in between.
Learn about this family of licenses that seek to limit harmful use of AI models.
We're not saying the NVD is dead but it's not looking good.
Learn how to navigate Large Language Model (LLM) risks and ensure the responsible development and deployment of these powerful models.
Discover the benefits. of keeping your software dependencies up-to-date. Learn how to manage dependencies effectively.
Threat hunting strategies for the software supply chain. Our report provides step-by-step instructions and real-world attack simulations.
Learn how the Mend.io and Sysdig integration boosts container security by combining runtime insights and vulnerability prioritization.
Join Rhys Arkins and Jeffrey Martin in a crucial webinar on tackling supply chain threats. Learn threat hunting strategies, & case studies.
Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices
Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.
Transform your application security from reactive to effective white paper. Download your copy today.
Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.
Learn how to improve your code and reduce security risks by updating dependencies with Mend Renovate. Join the webinar with Justin Clareburt.
Discover how to harness the power of AI while mitigating risks in this practical guide webinar with Chris Lindsey and Maciej Mensfeld.
The National Vulnerability Database's backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress
Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.
Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.
Discover how CVE-2024-3094 affects XZ Utils and enables SSH compromise. Get insights on detection, mitigation, and system security.
Join our webinar on maturing your application security program with experts Chris Lindsey and Jonny Stewart.
Discover the latest security threat as over 100 malicious packages target popular ML PyPi libraries. Learn about the attack methods.