Skip Navigation

Dependency mapping: A beginner's guide

By Aaron Linskens on October 20, 2023 vulnerabilities

8 minute read time

Explore dependency mapping, what it is, the benefits of mapping dependencies, and some tools that make the process easier.
Read More...

SAST vs. DAST: Enhancing application security

By Aaron Linskens on September 21, 2023 DAST

7 minute read time

Explore advantages and limits of static application security testing SAST and dynamic application security testing DAST in application security
Read More...

Getting started with the Secure Software Development Framework (SSDF)

6 minute read time

Discover how to get started with the Secure Software Development Framework (SSDF), what it contains, and why should you leverage it
Read More...

How to measure the maturity of your software supply chain

6 minute read time

Learn how to measure the maturity of your software supply chain and leverage a maturity framework for more secure and reliable software
Read More...

Better software development: Insights from the SBOM Scorecard

By Omar Torres on June 08, 2023 AppSec

2 minute read time

Data Insights– a look at Sonatype's SBOM scorecard.
Read More...

How to improve your software supply chain with a software security framework

8 minute read time

Enhance software supply chain security with a framework. Protect against attacks, meet regulations, and release secure software. Learn more now.
Read More...

Sonatype named in the 2023 Gartner® Magic Quadrant™ for Application Security Testing

By Tara Flynn Condon on May 23, 2023 AppSec

4 minute read time

Sonatype is named to the 2023 Gartner Magic Quadrant for Application Security Testing (AST).
Read More...

HID Global's three pillars of operational security

By Karin Althaus on June 15, 2022 Application Security

5 minute read time

The foundations of security at HID Global are a balanced set of tools, policies, and expertise. A look back at a DevSecOps Leadership Forums talks in Paris.
Read More...

Breaking Organizational Silos for Better Application Security

By Phil Vuollet on July 08, 2021 AppSec

3 minute read time

Security depends on collaboration and communication. Our recent Elevate talk breaks down pillars, structure, and suggestions for organizational silos.
Read More...