50 blog posts published by month since the start of 2023. Start from a different year:

Posts year-to-date
6 (7 posts by this month last year.)
Average posts per month since 2023
1.4

Post details (2023 to today)

Title Author Date Word count HN points
5 critical lessons from the latest GitHub phishing campaign by Gitloker Nir Valtman Jun 17, 2024 1389 -
Azure Permissions: Managing Granular Permissions in Azure Devops Eran Medan Jan 10, 2023 1645 -
Why Risk Scanning Needs to be Free: Don't Just Find Risks, Fix Them Simon Wenet Nov 20, 2023 1283 -
Trying to identify spoofing in GitHub? May the 4th be with you! Mark Maney May 03, 2023 1976 1
How to Determine the Severity of a Third-Party Risk with Software Composition Analysis (SCA) Simon Wenet Sep 27, 2023 1501 -
The Criticality of Context for Addressing Software Supply Chain Risk Mark Maney Jun 19, 2023 1753 -
Should I Manage Code in a Single Organization or Multiple Organizations? Mark Maney Jun 27, 2023 1101 -
[April fools] Introducing SecuriSlow™: Slowing Down Your Developers, Fast Nir Valtman Apr 01, 2024 274 -
How to ensure your third-party software packages are reputable Mark Maney Aug 16, 2023 1909 -
Best practices maintaining a secure development environment Mark Maney Jan 11, 2023 1961 -
How We Converted a GitHub Tool Into a General Purpose Webhook Proxy to Supercharge Our Integration Development Doron Guttman Apr 17, 2023 1949 3
Harnessing the Power of Secure Coding Practices for Effective CI/CD Security Nir Valtman Feb 13, 2023 1796 -
Defending Against Source Code Exfiltration, Fast and Slow Mike Doyle Apr 05, 2023 1272 -
How to ensure you don’t have Sourcegraph secrets in source code Nir Valtman Sep 04, 2023 630 3
Malicious Code Campaign on GitHub Repos: Is it Hype or a Dire Threat? Nir Valtman Mar 05, 2024 754 2
How to Evaluate a Static Application Security Testing (SAST) Solution Mark Maney Nov 13, 2023 1668 -
How to prioritize third-party package (SCA) vulnerabilities Mark Maney Nov 28, 2023 1410 -
What Every Developer Needs to Know About GitHub Branch Protection Nir Valtman Mar 13, 2024 1430 1
A Complete Guide: Enterprise Managed Users vs Bring Your Own Users on GitHub Nir Valtman Oct 17, 2023 1301 -
Why secrets continue to be a massive problem in source code Mark Maney May 30, 2023 1441 -
How insurance tech companies are leading the way on Application Security Simon Wenet May 03, 2023 970 -
What is an SBOM, what is it not, and do you need one? Mark Maney Mar 22, 2023 1649 -
SBOM For Your Software Supply Chain: Added Visibility or Security Risk? Mark Maney Sep 19, 2023 1176 -
The Essential Guide to SCA and SAST Simon Wenet Feb 08, 2024 505 -
CI/CD Pipeline Security vs. IDE plugins vs. Pipelineless Security Nir Valtman Nov 27, 2023 1881 -
Leveraging EPSS, CVSS, and KEV for Comprehensive Risk Management & Prioritization Simon Wenet Feb 20, 2024 1040 -
How to Detect & Prevent Source Code Exfiltration Simon Wenet Jul 05, 2023 1414 -
The Importance of EPSS in Vulnerability Prioritization: A Holistic Approach Eran Medan Mar 28, 2023 628 1
How to prioritize your backlog of hardcoded secrets Nir Valtman Jul 18, 2023 1884 -
What Developers Can Learn from Taylor Swift's Re-recording Strategy Nicholas Rodine Jun 12, 2023 1107 2
Adopting Pipelineless Security Solutions for Modern AppSec Programs Simon Wenet Apr 10, 2023 1465 -
Minimize AppSec Effort and Maximize AppSec Coverage with Pipelineless Security Scanning Nir Valtman Jan 23, 2024 1972 -
Practical Guide for Evaluating Secret Detection Solutions to Fit Modern Software Development Nir Valtman Jun 12, 2024 2043 -
Why Secret Scanning Visibility Should Be Free & Understanding Where There is Value Mike Doyle Jul 11, 2023 1420 -
Need for AppSec exposed by the ‘ResumeLooters’ SQL Injection & XSS Attacks Nir Valtman Feb 13, 2024 555 -
New York Times Data Breach Reveals Secrets & Source Code Simon Wenet Jul 10, 2024 832 -
Rabbit r1 Data Breach Again Shows The Dire Need for Improved Secrets Security Simon Wenet Jun 28, 2024 853 -
Building an AppSec Program, Powered by Pipelineless Security Nir Valtman Aug 20, 2024 2644 -
Time for an Honest Talk About Third-Party Risk Management and Software Composition Analysis (SCA) Mark Maney Sep 10, 2024 903 -
Optimizing Code Security: Advanced Strategies in SAST Scanning Simon Wenet Sep 17, 2024 2199 -
Implementing SAST Security Policies: Effective Strategies for Application Protection Eitam Arad Oct 10, 2024 2083 -
State of Developer Time Loss 2024: How Arnica’s Pipelineless Security Can Help Eitam Arad Nov 05, 2024 1748 -
Best Practices for SCA Scanning in Agile Development Eitam Arad Nov 14, 2024 2326 -
How Arnica's Low-Reputation Package Detection Could Have Prevented the XML-RPC npm Package Breach Eran Medan Dec 02, 2024 869 -
SAST vs. DAST: A Comparative Analysis Simon Wenet Jan 07, 2025 1158 -
Launching Opengrep in response to Semgrep's Open Source Licensing Change Eran Medan Jan 23, 2025 563 -
Evaluating SCA Tools for Addressing Open Source Vulnerabilities Anna Daugherty Feb 13, 2025 2520 -
Prioritizing AppSec Vulnerabilities: Developer Context vs. Full Reachability Nir Valtman Feb 11, 2025 524 -
Direct vs. Transitive Dependencies: Navigating Package Management in Software Composition Analysis (SCA) Anna Daugherty Feb 25, 2025 2908 -
GitHub Actions Supply Chain Attack: What Arnica Customers Need to Know Eran Medan Mar 17, 2025 677 -