blog_image

Feb 18, 2026

You have 10,000 open vulnerabilities. 2,000 are labeled "High" or "Critical." You have eno...

GREG ANDERSON

GREG ANDERSON

blog_image

Feb 18, 2026

2026 has not been kind to cybersecurity professionals and AI so far. I’ve already discusse...

securityAI

GREG ANDERSON

GREG ANDERSON

blog_image

Feb 18, 2026

As we navigate 2026, the complexity of the software supply chain has made Vulnerability Ma...

GREG ANDERSON

GREG ANDERSON

blog_image

Feb 18, 2026

In 2026, if you ask a Gartner analyst what to buy, they might say ArmorCode. It checks eve...

GREG ANDERSON

GREG ANDERSON

blog_image

Feb 17, 2026

Security scanners are designed to be paranoid. They will report the same issue every time ...

GREG ANDERSON

GREG ANDERSON

blog_image

Feb 16, 2026

In 2026, the biggest challenge in Application Security isn't *finding* vulnerabilities—it'...

GREG ANDERSON

GREG ANDERSON