Blog AJ Starita

AJ Starita

AJ Starita is fascinated by the challenges and triumphs of cybersecurity and open source software. When not writing about technology, AJ can usually be found exploring nature or reading detective novels.

Breaking: What is Going on with the NVD? Does it Affect Me?

Learn about the current issues with the National Vulnerability Database, how it affects vulnerability reporting, and how Mend SCA can help.

Read More

What is the difference between an SCA scan and a container scan?

Learn about the difference between SCA scans and container scans, why scanning containers for vulnerabilities is important.

Read More

How is a Container Scan Done?

Learn the importance of scanning container images for vulnerabilities to keep your containerized environments safe.

Read More

CVSS 4.0 is Here: How to Make the Most of It

Learn about the latest version of CVSS 4.0. Understand the new metrics and how to use them in your org’s vulnerability remediation strategy.

Read More

Top Tools for Automating SBOMs

Discover the top tools for automating SBOMs on our blog. Learn how to create SBOMs effortlessly and boost your supply chain security.

Read More

Mend’s Handy Guide to Using EPSS Scores

Discover Mend’s Handy Guide to Using EPSS Scores. Learn how EPSS can predict exploits and prioritize vulnerability remediation effectively.

Read More

Top Open Source Licenses Explained

Explore the top open source licenses explained in this blog post. Learn about copyleft vs permissive licenses, including GPL, Apache, MIT.

Read More

Building a Security Culture Starts with Building Relationships

Learn how building relationships between security and development teams can improve application security. Find key tactics for security.

Read More

What Developers Need to Succeed for Effective Application Security

Discover what developers need to succeed for application security. Learn about shifting left, automation, training, collaboration, and more.

Read More

Why The US Government Continues to Push for Software Supply Chain Security

Discover why the US government is prioritizing software supply chain security. Learn about CISA’s goals and objectives at the SOSS Summit.

Read More

Why Dependency Management Reduces Your Enterprise’s Technical Debt

Learn how dependency management can reduce technical debt in your enterprise. Find out how outdated dependencies can lead to security risks.

Read More

Adversaries Are Using Automation. Software Vendors Must Catch Up

Discover the importance of automation in cybersecurity and how software vendors can stay ahead of adversaries.

Read More

Communicating the Value of Your Company With SBOMs

Learn how to effectively communicate the value of your company with Software Bill of Materials (SBOMs).

Read More

Software Supply Chain Security: The Basics and Four Critical Best Practices

Learn about software supply chain security basics and best practices to prevent attacks.

Read More

Tips and Tools for Open Source Compliance

Learn how to manage open source compliance with tips, tools, and best practices. Create policies, track components, replace noncompliant code

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!