
.avif)
Welcome to our blog.

We Got Lucky: The Supply Chain Disaster That Almost Happened
Eighteen widely used open source packages were compromised, downloaded billions of times and embedded across nearly every cloud environment. The community dodged a bullet. But this close call shows just how fragile our software supply chain really is.
Customer Stories
See how teams like yours are using Aikido to simplify security and ship with confidence.
Compliance
Stay ahead of audits with clear, dev-friendly guidance on SOC 2, ISO standards, GDPR, NIS, and more.
Guides & Best Practices
Actionable tips, security workflows, and how-to guides to help you ship safer code faster.
DevSec Tools & Comparisons
Deep dives and side-by-sides of the top tools in the AppSec and DevSecOps landscape.
Your Client Requires NIS2 Vulnerability Patching. Now What?
Discover vulnerability requirements for NIS2 vulnerability patching compliance. Learn about critical timelines, proper documentation, and strategies to streamline your processes. Ensure your business meets EU cybersecurity standards efficiently.
Using Generative AI for Pentesting: What It Can (and Can’t) Do
Learn how generative AI is applied to pentesting, what it enables today, and its limitations.
The Startup's Open-Source Guide to Application Security
This comprehensive guide explores the some of the best open-source tools to build a security program for start-ups.
Launching Aikido for Cursor AI
Is Gen AI code secure? Integrate security directly into your AI Code editor with Aikido for Cursor AI. Devs can secure code as it's generated.
Meet Intel: Aikido’s Open Source threat feed powered by LLMs.
Aikido launches Intel, the AI-powered open-source security threat feed that identifies vulnerabilities in projects before disclosed
Aikido joins the AWS Partner Network
Aikido has joined the AWS Partner Network, offering industry-leading "time-to-security" for new AWS users. As a validated AWS partner, Aikido simplifies cloud security and compliance, enhancing visibility across services like EC2 and S3. Discover more on the AWS Marketplace.
Command injection in 2024 unpacked
Command injection continues to be a significant vulnerability in applications. This report reviews how many injection vulnerabilities are found in closed and open-source projects throughout 2024
Path Traversal in 2024 - The year unpacked
This report looks at how prominant path traversal is in 2024 by analysing how many vulnerabilities involving path traversal were discovered in open-source and closed-source projects.
Balancing Security: When to Leverage Open-Source Tools vs. Commercial Tools
Balancing Security: When to Leverage Open-Source Tools vs. Commercial Tools
Manual vs. Automated Pentesting: When Do You Need AI?
Compare manual vs automated pentesting, when to use AI, and how to balance speed with accuracy.
Reducing Cybersecurity Debt with AI Autotriage
We dive into how AI can assist us in a meaningful way to triage vulnerabilities and get rid of our security debt.
npm debug and chalk packages compromised
The popular packages debug and chalk on npm have been compromised with malicious code
Top Container Scanning Tools in 2025
Discover the best Container Scanning tools in 2025. Compare features, pros, cons, and integrations to choose the right solution for your DevSecOps pipeline.
SAST vs DAST: What you need to know.
Get an overview of SAST vs DAST, what they are, how to use them together, and why they matter for your application security.
Get secure for free
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.
.avif)
