Appsec Village

The malware dating guide: Understanding the types of malware on NPM

The malware dating guide: Understanding the typ...

You’ve heard of red flags in dating… but what about in your npm install? Our friends at Aikido Security just dropped the Malware Dating Guide. A brilliant (and hilarious) breakdown...

The malware dating guide: Understanding the typ...

You’ve heard of red flags in dating… but what about in your npm install? Our friends at Aikido Security just dropped the Malware Dating Guide. A brilliant (and hilarious) breakdown...

What’s Broken in Cybersecurity - and How Developer-First Security Can Fix It

What’s Broken in Cybersecurity - and How Develo...

What Does “Developer-First Security” Actually Look Like in Practice? This article cuts through the buzzwords to unpack what developer-first security really means—and why most current approaches fall short. It’s not...

What’s Broken in Cybersecurity - and How Develo...

What Does “Developer-First Security” Actually Look Like in Practice? This article cuts through the buzzwords to unpack what developer-first security really means—and why most current approaches fall short. It’s not...

Proven Strategies to Unlock Developer Adoption of AppSec

Proven Strategies to Unlock Developer Adoption ...

Strong developer buy-in is one of the most crucial ways AppSec managers can effectively fix vulnerabilities. But how can you get your dev teams to adopt a security minded approach?...

Proven Strategies to Unlock Developer Adoption ...

Strong developer buy-in is one of the most crucial ways AppSec managers can effectively fix vulnerabilities. But how can you get your dev teams to adopt a security minded approach?...

EU Cyber Resilience Act: A Practical Guide

EU Cyber Resilience Act: A Practical Guide

The EU Cyber Resilience Act introduces important new requirements for connected products and embedded software. It’s a meaningful shift—designed to raise the baseline for cybersecurity across the digital product lifecycle....

EU Cyber Resilience Act: A Practical Guide

The EU Cyber Resilience Act introduces important new requirements for connected products and embedded software. It’s a meaningful shift—designed to raise the baseline for cybersecurity across the digital product lifecycle....

The best way to secure your software supply chain? It depends.

The best way to secure your software supply cha...

Ever feel like dependency management is just chaos with extra steps? You patch one thing, something else breaks.You upgrade a package, the build fails.You triage a vuln, then find out...

The best way to secure your software supply cha...

Ever feel like dependency management is just chaos with extra steps? You patch one thing, something else breaks.You upgrade a package, the build fails.You triage a vuln, then find out...

The Rise of AI‑Native SAST

The Rise of AI‑Native SAST

Central Air > Window Units — and AI-Native > Retrofitted SAST You can survive a hot summer with a window unit... But wouldn't you rather have central air? Same goes...

The Rise of AI‑Native SAST

Central Air > Window Units — and AI-Native > Retrofitted SAST You can survive a hot summer with a window unit... But wouldn't you rather have central air? Same goes...