Blog AJ Starita

AJ Starita

AJ Starita is fascinated by the challenges and triumphs of cybersecurity and open source software. When not writing about technology, AJ can usually be found exploring nature or reading detective novels.

Application Security — The Complete Guide

Explore our application security complete guide and find key trends, testing methods, best practices, and tools to safeguard your software.

Read More

A Guide to Open Source Software

Learn more about how organizations can use open source software to innovate while minimizing risk.

Read More

SAST – All About Static Application Security Testing

Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org.

Read More

Dependency Management: Protecting Your Code

Learn how to protect your application’s code with dependency management, and why automation is critical for effective dependency updates.

Read More

Dependency Management vs Dependency Updates: What’s the Difference?

Keeping dependencies up to date is a big part of dependency management, but it’s not everything. Learn more about the differences between the two.

Read More

Hallucinated Packages, Malicious AI Models, and Insecure AI-Generated Code

Worried about attackers using AI models to write malicious code? Here are three other ways AI model use can lead to attacks.

Read More

Quick Guide to Popular AI Licenses

Not all “open” AI licenses are truly open source. Learn more about the most popular licenses on Hugging Face.

Read More

Threat Hunting 101: Five Common Threats to Look For

Learn more about supply chain threats and where to find them.

Read More

Responsible AI Licenses (RAIL): Here’s What You Need to Know

Learn about this family of licenses that seek to limit harmful use of AI models.

Read More

NVD Update: More Problems, More Letters, Some Questions Answered

We’re not saying the NVD is dead but it’s not looking good.

Read More

How Do I Protect My AI Model?

Learn essential strategies to secure your AI models from theft, denial of service, and other threats, covering copyright issues, risk management, and secure storage practices

Read More

Quick Guide to the OWASP OSS Risk Top 10

Learn about the top 10 risks of open source software, beyond just CVEs. From known vulnerabilities to unapproved changes.

Read More

What Makes Containers Vulnerable?

Learn about the vulnerabilities that containers bring to your applications and how to address them to keep attackers at bay.

Read More

OWASP Top 10 for LLM Applications: A Quick Guide

Discover the OWASP Top 10 for LLM Applications in this comprehensive guide. Learn about vulnerabilities, & prevention techniques.

Read More

Learning From History: AI Gender Bias

Learn about AI gender bias in large language models, how historical data impacts AI, & implications for women in health & car safety fields.

Read More

Mend.io Launches Mend Container

Mend.io launches Mend Container to address security in cloud-native development, offering reachability analysis and secrets detection.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!