Blog
-
May 01, 2025
- Security Automation
Why Community is Critical in Modern Cybersecurity
It’s never been easy to be a cybersecurity professional; it’s downright challenging today, and that’s frankly an understatement. New threats emerge constantly: over 40,000 common...
-
April 20, 2025
What Happens When the World's Vulnerability Backbone Breaks?
This week’s shakeup surrounding MITRE and the Common Vulnerabilities and Exposures (CVE) program has been a wake-up call for everyone in the cybersecurity ecosystem. The...
-
April 17, 2025
- Security Automation
Announcing the DefectDojo Open Source Security Awards
At DefectDojo we’re uniquely positioned to see many trends in security from the DefectDojo community and customers. We’re excited to share our list of best open-source tools for...
-
April 15, 2025
- Security Automation
Don’t Change Your Process for the Tool: Why AppSec Tools Must Adapt to You
When it comes to application security (AppSec), there’s no one-size-fits-all playbook. Every company structures its AppSec program a little differently, whether that’s because...
-
April 02, 2025
- Security Automation
The Cybersecurity Risks of a Centralized Federal Payment System: Lessons from AppSec and Vulnerability Management
The push for a centralized federal payment system is gaining momentum, promising streamlined transactions and enhanced efficiency. However, as we’ve seen time and again, rapid...
-
March 18, 2025
- Security Automation
Securing the AI Frontier
Artificial intelligence is no longer a futuristic concept in software development - it’s here, and it’s changing everything. According to PwC, AI can cut software development...