Blog
-
July 22, 2025
- Security Automation
Security Programs Succeed or Fail Solely on Vulnerability Management
It’s often the least glamorous part of cybersecurity, the endless cycle of scanning, identifying, and remediating. Yet, every road in a successful security program leads back to...
-
June 24, 2025
- Security Automation
DefectDojo Ushers in AI-era with MCP Support
DefectDojo Enables AI-First Cybersecurity with MCP Support Cybersecurity teams retain flexibility of using their AI model of choice and can remain confident that their data is...
-
June 21, 2025
Why CISA’s Advisory AA23-320A Should Be a Wake-Up Call for DevSecOps
The Aflac cyberattack and the massive 16 billion–credential leak making the rounds online are part of a much deeper story. While cyber attack tactics are evolving, the core...
-
May 22, 2025
- Security Automation
Supercharging Your Security Pipeline: Managing Vulnerabilities in a Multi-Tool Jungle
If you’re on a security team today, your job isn’t just about securing code anymore. It’s about managing a growing ecosystem of tools, findings, dashboards and alerts. During our...
-
May 22, 2025
- Security Automation
DefectDojo at OWASP Global AppSec Barcelona
Team DefectDojo is getting revved up for OWASP Global AppSec in Barcelona. It's F1 week and we're bringing the race to Global AppSec. If you're attending the show, please be sure...
-
May 01, 2025
- Security Automation
Why Community is Critical in Modern Cybersecurity
It’s never been easy to be a cybersecurity professional; it’s downright challenging today, and that’s frankly an understatement. New threats emerge constantly: over 40,000 common...