Blog
-
May 01, 2025
- Security Automation
Why Community is Critical in Modern Cybersecurity
It’s never been easy to be a cybersecurity professional; it’s downright challenging today, and that’s frankly an understatement. New threats emerge constantly: over 40,000 common...
-
April 20, 2025
What Happens When the World's Vulnerability Backbone Breaks?
This week’s shakeup surrounding MITRE and the Common Vulnerabilities and Exposures (CVE) program has been a wake-up call for everyone in the cybersecurity ecosystem. The...
-
April 17, 2025
- Security Automation
Announcing the DefectDojo Open Source Security Awards
At DefectDojo we’re uniquely positioned to see many trends in security from the DefectDojo community and customers. We’re excited to share our list of best open-source tools for...
-
April 02, 2025
- Security Automation
The Cybersecurity Risks of a Centralized Federal Payment System: Lessons from AppSec and Vulnerability Management
The push for a centralized federal payment system is gaining momentum, promising streamlined transactions and enhanced efficiency. However, as we’ve seen time and again, rapid...
-
January 30, 2025
- Security Automation
Protecting Your Data in a Distributed World: 3 Must-Have Strategies for Data Privacy Week
It’s Data Privacy Week - a timely reminder of the growing challenges of safeguarding information in a world driven by global data-sharing. As the old joke goes, the only truly...
-
July 22, 2024
- Security Automation
Why High Quality Security Results Matter
Establishing and maintaining an application security program is one of the most challenging undertakings for any security team. The dynamic nature of applications and the amount...