Filter & Search
All About RAG blog

All About RAG: What It Is and How to Keep It Secure

Learn about retrieval-augmented generation, one complex AI system that developers are using.

Read More
AI and AWS blog 1

Next-Gen Vulnerability Assessment: AWS Bedrock Claude in CVE Data Classification

Learn more about how organizations can use open source software to innovate while minimizing risk.

Read More
A quick Guide to Open Source software

A Guide to Open Source Software

Learn more about how organizations can use open source software to innovate while minimizing risk.

Read More
SAST – All About Static Application Security Testing

SAST – All About Static Application Security Testing

Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.

Read More
Blog image Dependency Management Protecting Your Code

Dependency Management: Protecting Your Code

Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates.

Read More
polyfill supply chain attack 1

More than 100K sites impacted by Polyfill supply chain attack

The new Chinese owner tampers with the code of cdn.polyfill.io to inject malware targeting mobile devices.

Read More
dependency management vs dependency updates whats the difference

Dependency Management vs Dependency Updates: What’s the Difference?

Keeping dependencies up to date is a big part of dependency management, but it’s not everything. Learn more about the differences between the two.

Read More
blog AI and malicious packages

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.

Read More
quick guide to popular AI licenses

Quick Guide to Popular AI Licenses

Not all “open” AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.

Read More
Broken NVD 1

NVD Update: Help Has Arrived

There’s hope yet for the world’s most beleaguered vulnerability database.

Read More
threat hunting report img

Threat Hunting 101: Five Common Threats to Look For

Learn more about supply chain threats and where to find them.

Read More
guide to the RAIL family of AI licenses

Responsible AI Licenses (RAIL): Here’s What You Need to Know

Learn about this family of licenses that seek to limit harmful use of AI models.

Read More
Broken NVD 1

NVD Update: More Problems, More Letters, Some Questions Answered

We’re not saying the NVD is dead but it’s not looking good.

Read More
getting started with dependency management

Getting Started with Software Dependency Management

Discover the benefits. of keeping your software dependencies up-to-date. Learn how to manage dependencies effectively.

Read More
mend and sysdig launch joint solution for container security

Mend.io and Sysdig Launch Joint Solution for Container Security

Learn how the Mend.io and Sysdig integration boosts container security by combining runtime insights and vulnerability prioritization.

Read More
how do I protect my AI model blog

How Do I Protect My AI Model?

Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!