Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 10 Software Composition Analysis (SCA) tools in 2025

85% of the code that we use doesn’t come from our own code, it comes from our open-source components and dependencies. This means attackers can know your code better than you do! SCA tools are our best line of defense to keep our open-source supply chain secure. Software Composition Analysis (SCA) tools, also known as open-source dependency scanning, help us understand the risks we have in our open-source supply chain.

Signing the CISA Secure by Design Pledge

Today, I’m thrilled to announce that Tines has formally signed CISA’s Secure by Design pledge. Since our founding, we have been guided by the fundamental belief that secure software is security software, and that our customers shouldn’t need to make a tradeoff between adding valuable automation capabilities or reducing their attack surface.

Inside the tech that continuously monitors our customers' attack surface

As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it helped us address a critical 0-day vulnerability within a day. In this article, we deep-dive into the problem space of monitoring our customers’ attack surface and distributing security tests to them.

SafeBreach 2024 Year in Review: Reflections from Co-Founder & CEO Guy Bejerano

Happy new year! 2025 is underway and the SafeBreach team is off to a strong start after a record-breaking 2024. We are keenly focused on the vision, goals, and opportunities that lie ahead in the new year—some of which we are excited to share in much more detail soon. But, before we close the books on 2024, I wanted to take a moment to reflect on all that we accomplished over the last year with the support and partnership of the SafeBreach community.

JFrog Cloud Native Innovation - Availability, Security Performance and Efficiency at Scale

JFrog uses open source tools such as Kubernetes, Kubernetes Event-driven Autoscaling (KEDA), and Prometheus to develop its cloud development infrastructure and ensure tight integration with the three leading cloud providers AWS, GCP, and Azure. Let’s explore how JFrog cloud deployments leverage our cloud-native architecture to provide enhanced security and management capabilities for DevOps while ensuring high availability and a transparent user experience for developers.

How to Secure AI and Protect Patient Data Leaks

AI systems bring transformative capabilities to industries like healthcare but introduce unique challenges in protecting patient data. Unlike traditional applications, AI systems rely on conversational interfaces and large datasets to train, test, and optimize performance, often including sensitive patient information. AI systems pose complex risks to patient data privacy and AI data security that cannot be effectively managed using traditional methods.

Tips and Considerations for Building a New Home

Embarking on the adventure of building a new home can be both exhilarating and daunting. It is an opportunity to create a space that perfectly aligns with your preferences, needs, and lifestyle. However, before the first shovel hits the ground, significant planning is needed to ensure your home-building experience is as smooth as possible. The key lies in thoughtful preparation and understanding the main pillars of home construction. Below, we highlight essential insights to guide you through building your dream home from conception to completion.