software dependency management
Software Dependency Management: A Complete Guide
Let’s say you have to build a closet. But the parts are all wrong–some of the screws are outdated, the panels do not fit as they should, and you do not...
What is a Software Bill of Materials (SBOM)?
Imagine buying a complex piece of furniture with dozens of parts—screws, brackets, shelves, and hinges. To assemble it confidently, you’d need a...
A Guide to Manual Penetration Testing
In our previous post onpenetration testing, we talked about testing is essential to uncover vulnerabilities that may often go unnoticed. But...
Codacy Security Adds Thousands of New SAST Rules With Semgrep Integration
If 2023 taught us anything, it’s that code quality and code security are inextricably linked. Their main commonality? They are both required upstream...
ci/cd security best practices
CI/CD Pipeline Security Best Practices
Continuous Integration/Continuous Development (CI/CD) pipelines lie at the core of the DevSecOps philosophy. CI/CD streamlines software delivery by...
open source license scanning
Open Source License Scanning: A Complete Guide
Building software with open-source components isn’t always the best idea. Licenses dictate how you can use, change, or share these components. And if...

Subscribe
to our blog

Stay updated with our monthly newsletter.