blog_image

Mar 31, 2026

DefectDojo’s open-source edition is the best way to start a unified vulnerability manageme...

vulnerability managementsecurityautomationopen sourceappsec

GREG ANDERSON

GREG ANDERSON

blog_image

Feb 26, 2026

Running scans using different SAST, DAST, IaaC, and proprietary scanners is only half of t...

vulnerability managementASPMintegrations

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Jan 14, 2026

If you are a Kenna customer, you are facing a hard deadline: End-of-Sale in March 2026 and...

vulnerability managementsecurityASPM

GREG ANDERSON

GREG ANDERSON

blog_image

Oct 29, 2025

In today's cloud-native landscape, securing containerized applications requires seamless i...

vulnerability managementconnectorsintegrationscloud security

DAWN VAN HOEGAERDEN

DAWN VAN HOEGAERDEN

blog_image

Sep 24, 2025

In the world of cybersecurity, some environments are more critical than others. For the de...

vulnerability managementsecurityGovernment

GREG ANDERSON

GREG ANDERSON

blog_image

Sep 17, 2025

The AI Security Revolution We Didn't Prepare For Artificial Intelligence has taken the cyb...

vulnerability managementsecurityAI

GREG ANDERSON

GREG ANDERSON