Products
Close Products
Open Products
Code Security
Open Source Security
CI/CD Security
Secrets Security
Infrastructure as Code (IaC) Security
Build Security
Anomaly Detection
Application Security Posture Management - ASPM
Malware Across DevOps
Resources
Close Resources
Open Resources
Resource Library
Datasheets & Product Briefs
eBooks
Whitepapers & Reports
Articles
Video Demonstrations
Webinars
Video Tutorials
Glossary
Malicious Code Digest
Company
Close Company
Open Company
About
Case Studies
Events
Press Media
Contact Us
Pricing
Blog
Login
Start Free Trial
Book a Demo
Xygeni Blog
Must-Read Posts
Protecting Against Open Source Malicious Packages: What Does (Not) Work
Anatomy of Malicious Packages: What Are the Trends?
Open Source Malicious Packages: The Problem
XZ Backdoor: “That was a close one”
Code Security
Python Dependency Injection: How to Do It Safely
April 17, 2025
ASPM
CycloneDX SBOM: See What You Ship—and Secure It
April 16, 2025
Attacks Analysis
AI SAST: How to Secure AI Code Before It Ships
April 14, 2025
Attacks Analysis
How Can Malicious Code Do Damage?
April 10, 2025
ASPM
DevSecOps Best Practices
April 9, 2025
ASPM
Third Party Risk Management: What Most Teams Miss
April 4, 2025
ASPM
DevSecOps All you Need to Know
April 3, 2025
Code Security
How to Prevent SQL Injection
March 27, 2025
Open-Source Security
EPSS vs CVSS: What’s the Difference?
March 26, 2025
SDLC
AI Cybersecurity: All you Need to Know
March 26, 2025
Open-Source Security
EPSS Score Vulnerability v4: What’s New
March 25, 2025
ASPM
What Is Operational Risk Management? Best Practices
March 24, 2025
Load More