Application security trends: Shift-left security, AI, and open source malware

Application security trends: Shift-left security, AI, and open source malware

Software is at the heart of business operations across most industries, which means application security has never been more critical. However, as organizations embrace cloud-native architectures, microservices, and open source components, the ...
Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25

Cybersecurity Insights with Contrast CISO David Lindner | 03/07/25

Insight No. 1. — Ransomware groups are using CISA’s KEV catalog as a runbook  Given that CISA's Known Exploited Vulnerabilities (KEV) catalog highlights the most actively exploited and critical Common Vulnerabilities and ...
When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business

When Your SaaS Vendor Goes Dark: A Guide to Protecting Your Business

When a SaaS vendor unexpectedly shuts down, your business faces significant risks. This comprehensive guide provides actionable strategies to recover your data, find alternative solutions, and implement preventative measures to ensure business ...
Behind the Baseline: Reflecting on the launch of the Open Source Project Security Baseline

Behind the Baseline: Reflecting on the launch of the Open Source Project Security Baseline

It's been a while since I've shared an update on the work Sonatype is doing in the open source ecosystem, so I'm excited to share an update on a few things we're ...
OpenAI vs. DeepSeek: Navigating the AI Trust Paradox in an Era of Geopolitical Tensions

OpenAI vs. DeepSeek: Navigating the AI Trust Paradox in an Era of Geopolitical Tensions

As geopolitical tensions reshape AI adoption, enterprises struggle to balance OpenAI's compliance frameworks against DeepSeek's cost efficiency. This 2025 analysis reveals critical security vulnerabilities, performance benchmarks, and regulatory risks for global deployments ...
Forging a Better Operator Quality of Life

Forging a Better Operator Quality of Life

A new Mythic add-on for Windows AgentsMythic provides flexibility to agent developers for how they want to describe and execute techniques. While this is great, it also means that when operators hop from ...
Assessing your open source software security efficacy

Assessing your open source software security efficacy

Open source software has become the foundation of modern application development. With up to 90% of most applications consisting of open source components, organizations — especially in financial services — need to ...

Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI

In this episode, we explore the rollout of digital driver’s licenses in states like Illinois and the potential privacy issues that come with them. Can digital IDs truly enhance convenience without compromising ...
The three panes of Nosey Parker Explorer's main page.

Introducing Nosey Parker Explorer

Introducing Nosey Parker Explorer: an interactive review tool for findings from Nosey Parker - the machine learning powered, multi-phase solution for locating secret exposure. The post Introducing Nosey Parker Explorer appeared first ...
DeepSeek: Revolutionizing AI with Efficiency, Innovation, and Affordability

DeepSeek: Revolutionizing AI with Efficiency, Innovation, and Affordability

DeepSeek redefines AI with cutting-edge innovations: MoE architecture activates only 37B parameters/token, FP8 training slashes costs, and latent attention boosts speed. Learn why it delivers GPT-4-level performance at 1/20th the cost, reshaping ...