
.avif)
.jpg)
Madeline Lawrence
Blog posts by Madeline Lawrence
Get the TL;DR: tj-actions/changed-files Supply Chain Attack
Let’s get into the tj-actions/changed-files supply chain attack, what you should do, what happened, and more information.
Snyk vs Aikido Security | G2 Reviews Snyk Alternative
Looking for a Snyk alternative? Compare Aikido vs Snyk with verified user reviews, directly from G2.
Launching Aikido for Cursor AI
Is Gen AI code secure? Integrate security directly into your AI Code editor with Aikido for Cursor AI. Devs can secure code as it's generated.
Automate compliance with SprintoGRC x Aikido
Discover how SprintoGRC and Aikido can automate your compliance, ensuring fast and efficient process for standards like SOC 2 and ISO 27001 while minimizing developer workload. Use Aikigo to automate technical vulnerability management. Get continuous monitoring, automated workflows, and seamless integrations that let you focus on building your business.
SAST vs DAST: What You Need to Know in 2026
Get an overview of SAST vs DAST, what they are, how to use them together, and why they matter for your application security.
Get secure now
Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.

