blog_image

Jan 14, 2026

If you are a Kenna customer, you are facing a hard deadline: End-of-Sale in March 2026 and...

vulnerability managementsecurityASPM

GREG ANDERSON

GREG ANDERSON

blog_image

Jan 8, 2026

I speak with security leaders, CISOs, and AppSec practitioners every single day. While eve...

securityopen sourceappsecASPM

GREG ANDERSON

GREG ANDERSON

blog_image

Nov 7, 2025

In today's cloud-native landscape, security teams face the challenge of managing vulnerabi...

connectorsintegrationscloud security

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Oct 29, 2025

In today's cloud-native landscape, securing containerized applications requires seamless i...

vulnerability managementconnectorsintegrationscloud security

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Sep 24, 2025

In the world of cybersecurity, some environments are more critical than others. For the de...

vulnerability managementsecurityGovernment

GREG ANDERSON

GREG ANDERSON

blog_image

Sep 17, 2025

The AI Security Revolution We Didn't Prepare For Artificial Intelligence has taken the cyb...

vulnerability managementsecurityAI

GREG ANDERSON

GREG ANDERSON