What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?
What are CVEs and how are they published? What kind of information do CVEs offer about security vulnerabilities in publicly released software?
Discover the top 10 security conferences to attend in 2021, whether in-person or virtually.
Discover the top 10 open source vulnerabilities in 2020, including Lodash, Jackson-databind, HtmlUnit, and more.
Discover the importance of Appsec Testing Orchestration in the evolving security threat landscape. Learn how to manage tools effectively.
Stay informed about the latest Apache Struts vulnerabilities and the ongoing debate of whether to continue using the framework or migrate off it.
Learn about the Common Vulnerability Scoring System (CVSS) v3.1 & how it measures severity, not risk, in assessing security vulnerabilities.
Learn about White Box Testing in software development with this comprehensive guide. Understand the types, techniques, tools, advantages.
Top tips for starting with a software composition analysis solution. Build a team, set goals beyond scanning, understand the data model, make policies work, start small.
Learn how to prioritize software security vulnerabilities effectively to ensure your team is addressing the most urgent threats first.
Learn all about black box testing in application security & quality assurance. Discover techniques, & tools and more.
Discover the top 7 questions to ask when evaluating a Software Composition Analysis solution for managing open source components.
Discover the top 9 code review tools for clean and secure source code, essential for detecting errors and defects before production.
Discover the top open source vulnerability databases beyond NVD. Learn how to track and remediate vulnerabilities in your software.
Learn why patch management is crucial for application security and how to implement it effectively. Discover best practices, tools, and more.
Learn about the differences between security scanning and runtime protection in application security testing. Explore tools and tech.
Learn why you need an open source vulnerability scanner to protect your applications from cyber attacks.