Products
Close Products
Open Products
Code Security
Open Source Security
CI/CD Security
Secrets Security
Infrastructure as Code (IaC) Security
Build Security
Anomaly Detection
Application Security Posture Management - ASPM
Malware Across DevOps
Resources
Close Resources
Open Resources
Resource Library
Datasheets & Product Briefs
eBooks
Whitepapers & Reports
Articles
Video Demonstrations
Webinars
Glossary
Malicious Code Digest
Company
Close Company
Open Company
About
Case Studies
Events
Press Media
Contact Us
Pricing
Blog
Login
Start Free Trial
Book a Demo
Xygeni Blog
Must-Read Posts
Protecting Against Open Source Malicious Packages: What Does (Not) Work
Anatomy of Malicious Packages: What Are the Trends?
Open Source Malicious Packages: The Problem
XZ Backdoor: “That was a close one”
Code Security
How to Prevent SQL Injection
March 27, 2025
Open-Source Security
EPSS vs CVSS: What’s the Difference?
March 26, 2025
SDLC
AI Cybersecurity: All you Need to Know
March 26, 2025
Open-Source Security
EPSS Score Vulnerability v4: What’s New
March 25, 2025
ASPM
What Is Operational Risk Management? Best Practices
March 24, 2025
Open-Source Security
EPSS Score Vulnerability Management: A New Standard
March 20, 2025
Open-Source Security
Security Assessment Software: Cut Risk & Stay Compliant
March 17, 2025
Open-Source Security
Open Source Software Vulnerability Scanner Guide
March 10, 2025
Open-Source Security
Exploitability & Zero-Day Threats: Stay Secure
March 5, 2025
IaC
Introduction to Infrastructure as Code Security
March 3, 2025
ASPM
Application Security Testing: Best Practices and Types
February 28, 2025
Code Security
Vulnerability Remediation: How to Prioritize
February 25, 2025
Load More