Blog AJ Starita

Author Avatar
AJ Starita Cloud FinOps

AJ Starita is fascinated by the challenges and triumphs of cybersecurity and open source software. When not writing about technology, AJ can usually be found exploring nature or reading detective novels.
how is a container scan done

How is a Container Scan Done?

Learn the importance of scanning container images for vulnerabilities to keep your containerized environments safe.

Read More
cvss4 is here how to make the most of it

CVSS 4.0 is Here: How to Make the Most of It

Learn about the latest version of CVSS 4.0. Understand the new metrics and how to use them in your org's vulnerability remediation strategy.

Read More
top tools for automating SBOMs img

Top Tools for Automating SBOMs

Discover the top tools for automating SBOMs on our blog. Learn how to create SBOMs effortlessly and boost your supply chain security.

Read More
guide to using epss scores

Mend’s Handy Guide to Using EPSS Scores

Discover Mend's Handy Guide to Using EPSS Scores. Learn how EPSS can predict exploits and prioritize vulnerability remediation effectively.

Read More
blog top open source licenses explained 1

Top Open Source Licenses Explained

Explore the top open source licenses explained in this blog post. Learn about copyleft vs permissive licenses, including GPL, Apache, MIT.

Read More
building security culture starts with building relationships

Building a Security Culture Starts with Building Relationships

Learn how building relationships between security and development teams can improve application security. Find key tactics for security.

Read More
what developers need do to implement effective appsec and dependency management

What Developers Need to Succeed for Effective Application Security

Discover what developers need to succeed for application security. Learn about shifting left, automation, training, collaboration, and more.

Read More
why dependency management reduces your enterprises technical debt

Why Dependency Management Reduces Your Enterprise’s Technical Debt

Learn how dependency management can reduce technical debt in your enterprise. Find out how outdated dependencies can lead to security risks.

Read More
attackers are using automation software vendors must catch up

Adversaries Are Using Automation. Software Vendors Must Catch Up

Discover the importance of automation in cybersecurity and how software vendors can stay ahead of adversaries.

Read More
how to communicate the value of your company with sboms

Communicating the Value of Your Company With SBOMs

Learn how to effectively communicate the value of your company with Software Bill of Materials (SBOMs).

Read More
software supply chain security the basics and four critical best practices

Software Supply Chain Security: The Basics and Four Critical Best Practices

Learn about software supply chain security basics and best practices to prevent attacks.

Read More
blog tips and tools for open source compliance

Tips and Tools for Open Source Compliance

Learn how to manage open source compliance with tips, tools, and best practices. Create policies, track components, replace noncompliant code

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!