CVSS 4.0 is Here: How to Make the Most of It
Learn about the latest version of CVSS 4.0. Understand the new metrics and how to use them in your org's vulnerability remediation strategy.
Quality > Quantity: How to Get the Most Out of SAST
Learn how to make the most out of Static Application Security Testing (SAST) without overwhelming developers.
Idempotency: The Microservices Architect’s Shield Against Chaos
Discover the power of idempotency in microservices architecture. Learn how to maintain data consistency and predictability.
What Existing Security Threats Do AI and LLMs Amplify? What Can We Do About Them?
Learn about the existing security threats that AI and LLMs amplify and how to protect against them.
Top Tools for Automating SBOMs
Discover the top tools for automating SBOMs on our blog. Learn how to create SBOMs effortlessly and boost your supply chain security.
How to Manage Secrets in Kubernetes
Learn how to manage secrets in Kubernetes with best practices & tools. Secure your apps & data with Kubernetes Secrets & External Secrets.
Mend’s Handy Guide to Using EPSS Scores
Discover Mend's Handy Guide to Using EPSS Scores. Learn how EPSS can predict exploits and prioritize vulnerability remediation effectively.
The Challenges for License Compliance and Copyright with AI
Discover the challenges of license compliance and copyright with AI-generated code in software development. Learn about legal risks.
Six More Top Tips For Holistic AppSec and Software Supply Chain Security
Learn how to strengthen your security posture with holistic approaches to application security and software supply chain security.
Six Top Tips For Holistic AppSec and Software Supply Chain Security
Discover six top tips for holistic application security and software supply chain security for long-term success.
Turnover, Relationships, and Tools in Cybersecurity
Discover effective strategies for handling security team turnover, maintaining tool efficiency, and fostering strong developer relationships.
Closing the Loop on Python Circular Import Issue
Learn how to address and prevent Python circular import issues to write cleaner and more maintainable code. Strategies, examples, and more.
Top Open Source Licenses Explained
Explore the top open source licenses explained in this blog post. Learn about copyleft vs permissive licenses, including GPL, Apache, MIT.
Building a Security Culture Starts with Building Relationships
Learn how building relationships between security and development teams can improve application security. Find key tactics for security.
Getting Started with npm Basics: Mastering Node Package Manager Commands
Learn the basics of npm with this comprehensive guide. From installation to package management, and mastering Node Package Manager commands.
What New Security Threats Arise from The Boom in AI and LLMs?
Explore the security threats arising from the boom in AI and LLMs, including data privacy, misinformation, and resource exhaustion.
Join our subscriber list to get the latest news and updates
Thanks for signing up!