blog_image

Apr 2, 2025

The push for a centralized federal payment system is gaining momentum, promising streamlin...

securityGovernment

GREG ANDERSON

GREG ANDERSON

blog_image

Mar 18, 2025

Artificial intelligence is no longer a futuristic concept in software development - it’s h...

securityAI

MATT TESAURO

MATT TESAURO

blog_image

Mar 14, 2025

March 13 marked 10 years of open source DefectDojo, a tremendous milestone. During that ti...

vulnerability managementsecurityeventsopen source

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Mar 13, 2025

DefectDojo was born out of the frustration of dealing with unscalable cybersecurity tools,...

vulnerability managementsecurityautomation

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Feb 10, 2025

Struggling to keep up with thousands of vulnerability findings? Learn how Pearson used Def...

vulnerability managementsecurityautomationfindings

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Feb 6, 2025

Security isn’t a one-time checkbox - it’s a continuous process that evolves alongside your...

vulnerability managementsecurityopen source

MATT TESAURO

MATT TESAURO