Company Data Deep Dive
Arnica
blog content
72 blog posts published by month since the start of 2021. Start from a different year:
2021
2022
2023
2024
2025
4
4
3
3
2
2
1
1
0
0
Posts published
1-2021
1-2021
2-2021
2-2021
3-2021
3-2021
4-2021
4-2021
5-2021
5-2021
6-2021
6-2021
7-2021
7-2021
8-2021
8-2021
9-2021
9-2021
10-2021
10-2021
11-2021
11-2021
12-2021
12-2021
1-2022
1-2022
2-2022
2-2022
3-2022
3-2022
4-2022
4-2022
5-2022
5-2022
6-2022
6-2022
7-2022
7-2022
8-2022
8-2022
9-2022
9-2022
10-2022
10-2022
11-2022
11-2022
12-2022
12-2022
1-2023
1-2023
2-2023
2-2023
3-2023
3-2023
4-2023
4-2023
5-2023
5-2023
6-2023
6-2023
7-2023
7-2023
8-2023
8-2023
9-2023
9-2023
10-2023
10-2023
11-2023
11-2023
12-2023
12-2023
1-2024
1-2024
2-2024
2-2024
3-2024
3-2024
4-2024
4-2024
5-2024
5-2024
6-2024
6-2024
7-2024
7-2024
8-2024
8-2024
9-2024
9-2024
10-2024
10-2024
11-2024
11-2024
12-2024
12-2024
1-2025
1-2025
2-2025
2-2025
3-2025
3-2025
Blog URL
www.arnica.io/blog
Posts year-to-date
6
(6 posts by this month last year.)
Average posts per month since 2021
1.2
Post details (2021 to today)
Showing 1 to 50 of 72 entries
Search:
Title
Author
Date
Word count
HN points
GitHub Actions Supply Chain Attack: What Arnica Customers Ne…
Eran Medan
Mar 17, 2025
677
-
Direct vs. Transitive Dependencies: Navigating Package Manag…
Anna Daugherty
Feb 25, 2025
2908
-
Evaluating SCA Tools for Addressing Open Source Vulnerabilit…
Anna Daugherty
Feb 13, 2025
2520
-
Prioritizing AppSec Vulnerabilities: Developer Context vs. F…
Nir Valtman
Feb 11, 2025
524
-
Launching Opengrep in response to Semgrep's Open Source Lice…
Eran Medan
Jan 23, 2025
563
-
SAST vs. DAST: A Comparative Analysis
Simon Wenet
Jan 07, 2025
1158
-
How Arnica's Low-Reputation Package Detection Could Have Pre…
Eran Medan
Dec 02, 2024
869
-
Best Practices for SCA Scanning in Agile Development
Eitam Arad
Nov 14, 2024
2326
-
State of Developer Time Loss 2024: How Arnica’s Pipelineless…
Eitam Arad
Nov 05, 2024
1748
-
Implementing SAST Security Policies: Effective Strategies fo…
Eitam Arad
Oct 10, 2024
2083
-
Optimizing Code Security: Advanced Strategies in SAST Scanni…
Simon Wenet
Sep 17, 2024
2199
-
Time for an Honest Talk About Third-Party Risk Management an…
Mark Maney
Sep 10, 2024
903
-
Building an AppSec Program, Powered by Pipelineless Security
Nir Valtman
Aug 20, 2024
2644
-
New York Times Data Breach Reveals Secrets & Source Code
Simon Wenet
Jul 10, 2024
832
-
Rabbit r1 Data Breach Again Shows The Dire Need for Improved…
Simon Wenet
Jun 28, 2024
853
-
5 critical lessons from the latest GitHub phishing campaign …
Nir Valtman
Jun 17, 2024
1389
-
Practical Guide for Evaluating Secret Detection Solutions to…
Nir Valtman
Jun 12, 2024
2043
-
[April fools] Introducing SecuriSlow™: Slowing Down Your Dev…
Nir Valtman
Apr 01, 2024
274
-
What Every Developer Needs to Know About GitHub Branch Prote…
Nir Valtman
Mar 13, 2024
1430
1
Malicious Code Campaign on GitHub Repos: Is it Hype or a Dir…
Nir Valtman
Mar 05, 2024
754
2
Leveraging EPSS, CVSS, and KEV for Comprehensive Risk Manage…
Simon Wenet
Feb 20, 2024
1040
-
Need for AppSec exposed by the ‘ResumeLooters’ SQL Injection…
Nir Valtman
Feb 13, 2024
555
-
The Essential Guide to SCA and SAST
Simon Wenet
Feb 08, 2024
505
-
Minimize AppSec Effort and Maximize AppSec Coverage with Pip…
Nir Valtman
Jan 23, 2024
1972
-
How to prioritize third-party package (SCA) vulnerabilities
Mark Maney
Nov 28, 2023
1410
-
CI/CD Pipeline Security vs. IDE plugins vs. Pipelineless Sec…
Nir Valtman
Nov 27, 2023
1881
-
Why Risk Scanning Needs to be Free: Don't Just Find Risks, F…
Simon Wenet
Nov 20, 2023
1283
-
How to Evaluate a Static Application Security Testing (SAST)…
Mark Maney
Nov 13, 2023
1668
-
A Complete Guide: Enterprise Managed Users vs Bring Your Own…
Nir Valtman
Oct 17, 2023
1301
-
How to Determine the Severity of a Third-Party Risk with Sof…
Simon Wenet
Sep 27, 2023
1501
-
SBOM For Your Software Supply Chain: Added Visibility or Sec…
Mark Maney
Sep 19, 2023
1176
-
How to ensure you don’t have Sourcegraph secrets in source c…
Nir Valtman
Sep 04, 2023
630
3
How to ensure your third-party software packages are reputab…
Mark Maney
Aug 16, 2023
1909
-
How to prioritize your backlog of hardcoded secrets
Nir Valtman
Jul 18, 2023
1884
-
Why Secret Scanning Visibility Should Be Free & Understa…
Mike Doyle
Jul 11, 2023
1420
-
How to Detect & Prevent Source Code Exfiltration
Simon Wenet
Jul 05, 2023
1414
-
Should I Manage Code in a Single Organization or Multiple Or…
Mark Maney
Jun 27, 2023
1101
-
The Criticality of Context for Addressing Software Supply Ch…
Mark Maney
Jun 19, 2023
1753
-
What Developers Can Learn from Taylor Swift's Re-recording S…
Nicholas Rodine
Jun 12, 2023
1107
2
Why secrets continue to be a massive problem in source code
Mark Maney
May 30, 2023
1441
-
How insurance tech companies are leading the way on Applicat…
Simon Wenet
May 03, 2023
970
-
Trying to identify spoofing in GitHub? May the 4th be with y…
Mark Maney
May 03, 2023
1976
1
How We Converted a GitHub Tool Into a General Purpose Webhoo…
Doron Guttman
Apr 17, 2023
1949
3
Adopting Pipelineless Security Solutions for Modern AppSec P…
Simon Wenet
Apr 10, 2023
1465
-
Defending Against Source Code Exfiltration, Fast and Slow
Mike Doyle
Apr 05, 2023
1272
-
The Importance of EPSS in Vulnerability Prioritization: A Ho…
Eran Medan
Mar 28, 2023
628
1
What is an SBOM, what is it not, and do you need one?
Mark Maney
Mar 22, 2023
1649
-
Harnessing the Power of Secure Coding Practices for Effectiv…
Nir Valtman
Feb 13, 2023
1796
-
Best practices maintaining a secure development environment
Mark Maney
Jan 11, 2023
1961
-
Azure Permissions: Managing Granular Permissions in Azure De…
Eran Medan
Jan 10, 2023
1645
-
«
‹
1
2
›
»