blog_image

Jul 22, 2025

It’s often the least glamorous part of cybersecurity, the endless cycle of scanning, ident...

vulnerability managementsecurityautomationappsec

GREG ANDERSON

GREG ANDERSON

blog_image

May 22, 2025

If you’re on a security team today, your job isn’t just about securing code anymore. It’s ...

vulnerability managementsecurityautomationappsec

GREG ANDERSON

GREG ANDERSON

blog_image

Mar 13, 2025

DefectDojo was born out of the frustration of dealing with unscalable cybersecurity tools,...

vulnerability managementsecurityautomation

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Feb 10, 2025

Struggling to keep up with thousands of vulnerability findings? Learn how Pearson used Def...

vulnerability managementsecurityautomationfindings

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Dec 17, 2024

Conversations in application security (AppSec) usually revolve around the latest tools and...

vulnerability managementsecurityautomation

MATT TESAURO

MATT TESAURO

blog_image

Oct 16, 2024

vulnerability managementsecurityautomation

MATT TESAURO

MATT TESAURO