Products
Close Products
Open Products
Code Security
Open Source Security
CI/CD Security
Secrets Security
Infrastructure as Code (IaC) Security
Build Security
Anomaly Detection
Application Security Posture Management - ASPM
Resources
Close Resources
Open Resources
Resource Library
Datasheets & Product Briefs
eBooks
Whitepapers & Reports
Video Demonstrations
Webinars
Glossary
Malicious Code Digest
Company
Close Company
Open Company
About
Case Studies
Events
Press Media
Contact Us
Pricing
Blog
Login
Start Free Trial
Book a Demo
Xygeni Blog
Open-Source Security
Cybersecurity Risk Assessment: A Developer’s Guide
February 7, 2025
Software Supply Chain
OSS Security – Protecting the Open-Source Supply Chain
January 31, 2025
Code Security
Secure Code Development SaaS: Best Practices
January 30, 2025
Open-Source Security
Open Source Software Security: Choosing the Right Tools
January 29, 2025
Build Security
The Power of SAST Tool for SQL Injection Vulnerability
January 28, 2025
Build Security
Build Artifacts Management Tools: Secure Your CI/CD
January 24, 2025
Software Supply Chain
Secure Coding Practices Checklist for 2025
January 22, 2025
Open-Source Security
How Do I Know if Git Hub App is Safe?
January 16, 2025
Open-Source Security
Dissecting a Multi-Stage Infostealer Malware Package
January 15, 2025
Software Supply Chain
How Can You Prevent Viruses and Malicious Code?
January 8, 2025
Software Supply Chain
Benefits of DevSecOps Strategies: Strengthen your SSCS
December 30, 2024
Code Security
Cross-Site Scripting : What It Is and How to Stay Secure
December 27, 2024
Load More