Blog
-
June 24, 2025
- Security Automation
DefectDojo Ushers in AI-era with MCP Support
DefectDojo Enables AI-First Cybersecurity with MCP Support Cybersecurity teams retain flexibility of using their AI model of choice and can remain confident that their data is...
-
June 21, 2025
Why CISA’s Advisory AA23-320A Should Be a Wake-Up Call for DevSecOps
The Aflac cyberattack and the massive 16 billion–credential leak making the rounds online are part of a much deeper story. While cyber attack tactics are evolving, the core...
-
May 22, 2025
- Security Automation
Supercharging Your Security Pipeline: Managing Vulnerabilities in a Multi-Tool Jungle
If you’re on a security team today, your job isn’t just about securing code anymore. It’s about managing a growing ecosystem of tools, findings, dashboards and alerts. During our...
-
May 01, 2025
- Security Automation
Why Community is Critical in Modern Cybersecurity
It’s never been easy to be a cybersecurity professional; it’s downright challenging today, and that’s frankly an understatement. New threats emerge constantly: over 40,000 common...
-
April 20, 2025
What Happens When the World's Vulnerability Backbone Breaks?
This week’s shakeup surrounding MITRE and the Common Vulnerabilities and Exposures (CVE) program has been a wake-up call for everyone in the cybersecurity ecosystem. The...
-
April 17, 2025
- Security Automation
Announcing the DefectDojo Open Source Security Awards
At DefectDojo we’re uniquely positioned to see many trends in security from the DefectDojo community and customers. We’re excited to share our list of best open-source tools for...