| 5 critical lessons from the latest GitHub phishing campaign by Gitloker |
Nir Valtman |
Jun 17, 2024 |
1389 |
- |
| [April fools] Introducing SecuriSlow™: Slowing Down Your Developers, Fast |
Nir Valtman |
Apr 01, 2024 |
274 |
- |
| Malicious Code Campaign on GitHub Repos: Is it Hype or a Dire Threat? |
Nir Valtman |
Mar 05, 2024 |
754 |
2 |
| What Every Developer Needs to Know About GitHub Branch Protection |
Nir Valtman |
Mar 13, 2024 |
1430 |
1 |
| The Essential Guide to SCA and SAST |
Simon Wenet |
Feb 08, 2024 |
505 |
- |
| Leveraging EPSS, CVSS, and KEV for Comprehensive Risk Management & Prioritization |
Simon Wenet |
Feb 20, 2024 |
1040 |
- |
| Minimize AppSec Effort and Maximize AppSec Coverage with Pipelineless Security Scanning |
Nir Valtman |
Jan 23, 2024 |
1972 |
- |
| Practical Guide for Evaluating Secret Detection Solutions to Fit Modern Software Development |
Nir Valtman |
Jun 12, 2024 |
2043 |
- |
| Need for AppSec exposed by the ‘ResumeLooters’ SQL Injection & XSS Attacks |
Nir Valtman |
Feb 13, 2024 |
555 |
- |
| New York Times Data Breach Reveals Secrets & Source Code |
Simon Wenet |
Jul 10, 2024 |
832 |
- |
| Rabbit r1 Data Breach Again Shows The Dire Need for Improved Secrets Security |
Simon Wenet |
Jun 28, 2024 |
853 |
- |
| Building an AppSec Program, Powered by Pipelineless Security |
Nir Valtman |
Aug 20, 2024 |
2644 |
- |
| Time for an Honest Talk About Third-Party Risk Management and Software Composition Analysis (SCA) |
Mark Maney |
Sep 10, 2024 |
903 |
- |
| Optimizing Code Security: Advanced Strategies in SAST Scanning |
Simon Wenet |
Sep 17, 2024 |
2199 |
- |
| Implementing SAST Security Policies: Effective Strategies for Application Protection |
Eitam Arad |
Oct 10, 2024 |
2083 |
- |
| State of Developer Time Loss 2024: How Arnica’s Pipelineless Security Can Help |
Eitam Arad |
Nov 05, 2024 |
1748 |
- |
| Best Practices for SCA Scanning in Agile Development |
Eitam Arad |
Nov 14, 2024 |
2326 |
- |
| How Arnica's Low-Reputation Package Detection Could Have Prevented the XML-RPC npm Package Breach |
Eran Medan |
Dec 02, 2024 |
869 |
- |
| SAST vs. DAST: A Comparative Analysis |
Simon Wenet |
Jan 07, 2025 |
1158 |
- |
| Launching Opengrep in response to Semgrep's Open Source Licensing Change |
Eran Medan |
Jan 23, 2025 |
563 |
- |
| Evaluating SCA Tools for Addressing Open Source Vulnerabilities |
Anna Daugherty |
Feb 13, 2025 |
2520 |
- |
| Prioritizing AppSec Vulnerabilities: Developer Context vs. Full Reachability |
Nir Valtman |
Feb 11, 2025 |
524 |
- |
| Direct vs. Transitive Dependencies: Navigating Package Management in Software Composition Analysis (SCA) |
Anna Daugherty |
Feb 25, 2025 |
2908 |
- |
| GitHub Actions Supply Chain Attack: What Arnica Customers Need to Know |
Eran Medan |
Mar 17, 2025 |
677 |
- |
| How Pipelineless SAST Enforces Application Security Without Slowing Developers Down |
Anna Daugherty |
Apr 09, 2025 |
1501 |
- |
| Arnica Now Available on AWS Marketplace |
Anna Daugherty |
Apr 23, 2025 |
384 |
- |
| SCA Testing for Secure Software Development: When, Where, and How to Scan for Maximum Impact |
Arnica |
May 01, 2025 |
2074 |
- |
| How Regulated Industries Can Evaluate Pipelineless Security Integration Solutions |
Arnica |
May 14, 2025 |
2721 |
- |
| Understanding the Hidden Costs of DevSecOps Automation Tools |
Anna Daugherty |
May 10, 2025 |
2089 |
- |
| “Increasing AppSec effectiveness isn’t just a fantasy.” - Key Takeaways from GISEC 2025 |
Anna Daugherty |
May 09, 2025 |
506 |
- |
| Top Application Security Posture Management Tools DevSecOps Teams Rely On |
Arnica |
Jul 01, 2025 |
1782 |
- |
| Arnica Recognized by Gartner® in the 2025 Hype Cycle™ for Software Engineering |
Anna Daugherty |
Jul 10, 2025 |
86 |
- |
| Incremental SCA Scanning Strategies for Large-Scale Monorepos |
Arnica |
Jul 15, 2025 |
944 |
- |
| Customizing Software Composition Analysis Tools to Enforce Industry-Specific Risk Thresholds |
Arnica |
Jul 15, 2025 |
924 |
- |
| Using Behavioral Analytics to Improve Real-Time Application Security Monitoring |
Arnica |
Jun 26, 2025 |
1256 |
- |
| ASPM Tools That Empower Developers Without Slowing Them Down |
Arnica |
Jul 01, 2025 |
1553 |
- |
| Arnica Named a Representative Vendor in 2025 Gartner Hype Cycle for Application Security |
Anna Daugherty |
Jul 31, 2025 |
471 |
- |
| Designing Automated Security Workflows Across Multi-Cloud Codebases |
Arnica |
Jun 26, 2025 |
1066 |
- |
| Arnica Positioned as a Major Player in the 2025 IDC MarketScape for ASPM |
Anna Daugherty |
Sep 09, 2025 |
429 |
- |
| Meet Arnie: Your AI Code Protector |
Arnica |
Sep 23, 2025 |
764 |
- |
| Secure Coding Agent Architectures for Enterprise Repositories |
Arnica |
Oct 03, 2025 |
1400 |
- |
| Building a Zero-Trust Model for Agentic AI Security |
Arnica |
Oct 03, 2025 |
1460 |
- |
| From Vibe Coding to Viable Coding: How to Make AI Work in Your Enterprise [WEBINAR] |
Arnica |
Oct 08, 2025 |
500 |
- |
| Why Agentic AI Is the Next Leap in Retail Decision-Making |
Arnica |
Oct 27, 2025 |
1044 |
- |
| Beneath the Surface of Multi-Agent AppSec |
Nir Valtman |
Nov 04, 2025 |
734 |
- |