Blog
-
May 22, 2025
- Security Automation
Supercharging Your Security Pipeline: Managing Vulnerabilities in a Multi-Tool Jungle
If you’re on a security team today, your job isn’t just about securing code anymore. It’s about managing a growing ecosystem of tools, findings, dashboards and alerts. During our...
-
May 01, 2025
- Security Automation
Why Community is Critical in Modern Cybersecurity
It’s never been easy to be a cybersecurity professional; it’s downright challenging today, and that’s frankly an understatement. New threats emerge constantly: over 40,000 common...
-
April 20, 2025
What Happens When the World's Vulnerability Backbone Breaks?
This week’s shakeup surrounding MITRE and the Common Vulnerabilities and Exposures (CVE) program has been a wake-up call for everyone in the cybersecurity ecosystem. The...
-
April 17, 2025
- Security Automation
Announcing the DefectDojo Open Source Security Awards
At DefectDojo we’re uniquely positioned to see many trends in security from the DefectDojo community and customers. We’re excited to share our list of best open-source tools for...
-
April 02, 2025
- Security Automation
The Cybersecurity Risks of a Centralized Federal Payment System: Lessons from AppSec and Vulnerability Management
The push for a centralized federal payment system is gaining momentum, promising streamlined transactions and enhanced efficiency. However, as we’ve seen time and again, rapid...
-
January 30, 2025
- Security Automation
Protecting Your Data in a Distributed World: 3 Must-Have Strategies for Data Privacy Week
It’s Data Privacy Week - a timely reminder of the growing challenges of safeguarding information in a world driven by global data-sharing. As the old joke goes, the only truly...