Blog Adam Murray

Adam Murray

Writes about open source security and risk mitigation.

When to Consider a NoSQL vs Relational Database

Learn when to consider using a NoSQL vs relational database in your org. Understand the benefits & where NoSQL may be the better option.

Read More

npm: How To Install A Specific Version of Node.js Package

Learn how to install a specific version of a Node.js package using npm, & check versions, install older versions, & use semantic versioning.

Read More

RASP: The What, Why and How

Explore the world of RASP – Runtime Application Self-Protection in this informative blog post. Learn why developers need it.

Read More

Serverless Security Explained

Learn about serverless security in the cloud ecosystem, including best practices like staying up to date, least privilege, and more.

Read More

Top 3 Open Source Risks and How to Beat Them

Discover the top 3 open source risks: security vulnerabilities, licensing compliance, and quality issues. Learn how to mitigate these risks.

Read More

Gray Box Testing Guide

Discover the comprehensive guide to gray box testing, a blend of black and white box methods, to enhance your application’s security.

Read More

Microservices Architecture: Security Strategies and Best Practices

Learn about microservices architecture and the security strategies and best practices needed to protect your organization’s systems.

Read More

API Security in a Digitally Transformed World

Learn about API security. Understand the importance of securing APIs and the best practices to protect your organization.

Read More

White Hat Hacking – Not What You Expect

Discover the world of white hat hacking and the importance of ethical hackers in open source projects.

Read More

How to Set Up an Open Source Strategy

Learn how to set up an open source strategy for your software development org. Understand the key considerations, and implementation steps..

Read More

CVE (Common Vulnerabilities and Exposures) — What is it and how to understand it

What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?

Read More

The 10 Best Security Conferences to Attend in 2021

Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.

Read More

Top 10 Open Source Vulnerabilities In 2020

Discover the top 10 open source vulnerabilities in 2020, including Lodash, Jackson-databind, HtmlUnit, and more.

Read More

What You Need To Know About Application Security Testing Orchestration

Discover the importance of Appsec Testing Orchestration in the evolving security threat landscape. Learn how to manage tools effectively.

Read More

Apache Struts Vulnerabilities Pose ‘Stay or Go’ Question

Stay informed about the latest Apache Struts vulnerabilities and the ongoing debate of whether to continue using the framework or migrate off it.

Read More

Get to know Mend Merge Confidence Feature

Introducing Mend Merge Confidence, a feature to save time and reduce risk in updating dependencies. Learn how it works and more.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!