Keep up with the latest updates from Arnica
Subscribe to our newsletter for updates
Thank you for subscribing to our newsletter!
We'll continue to plant the Arnica seeds with you.
Our apologies, it seems something went wrong with the subscription submission. Please try again.
Sign-up to our RSS feeds
Announcements
Blog
Press
All Posts
Announcements
Blog
Press
Help
External link icon
Enhance Software Composition Analysis (SCA) with Reachability | Arnica
September 23, 2024
Enhance Software Supply Chain Security with SCA + Package Reputation | Arnica
September 12, 2024
Automated Risk Resolution Workflows: Upgrade Your Vulnerability Management || Arnica
August 26, 2024
New Feature: Code Risks Tracking for Multi-Branch Repositories | Arnica
July 9, 2024
New Feature: "W00t W00t" aka Code Risk Mitigation Shoutouts
May 1, 2024
New Integration: Security Issue Management [that rocks!] with Jira + ADO Boards
April 17, 2024
New Feature: AI-Based Code Risk Mitigations
January 19, 2024
New Integration: Introducing Arnica’s Application Security for Bitbucket Users
August 30, 2023
Arnica achieves SOC2 Type 2 & ISO27001 compliance
January 23, 2023
New Feature: Continuous Software Bill of Materials (SBOM)
November 15, 2022
We launched Arnica today. Here is our story.
October 24, 2022
New Feature: Secret Detection & Mitigation | Arnica
October 13, 2022
New Feature: Anomalous Developer Behavior | Arnica
October 13, 2022
New Feature: Automated Developer Permissions Management | Arnica
September 14, 2022
New Feature: One-Click Risk Mitigations
September 8, 2022
Post image
State of Developer Time Loss 2024: How Arnica’s Pipelineless Security Can Help
November 5, 2024
Post image
Optimizing Code Security: Advanced Strategies in SAST Scanning
September 17, 2024
Post image
Time for an Honest Talk About Third-Party Risk Management and Software Composition Analysis (SCA)
September 10, 2024
Post image
Building an AppSec Program, Powered by Pipelineless Security
August 20, 2024
Post image
New York Times Data Breach Reveals Secrets & Source Code
July 10, 2024
Post image
Rabbit r1 Data Breach Again Shows The Dire Need for Improved Secrets Security
June 28, 2024
Post image
5 critical lessons from the latest GitHub phishing campaign by Gitloker
June 17, 2024
Post image
Practical Guide for Evaluating Secret Detection Solutions to Fit Modern Software Development
June 12, 2024
Post image
[April fools] Introducing SecuriSlow™: Slowing Down Your Developers, Fast
April 1, 2024
Post image
GitHub Branch Protection Guide: Keys for Developers
March 13, 2024
Post image
Malicious Code Campaign on GitHub Repos: Is it Hype or a Dire Threat?
March 5, 2024
Post image
EPSS vs CVSS vs KEV for Nuanced Risk Management
February 20, 2024
Post image
Need for AppSec exposed by the ‘ResumeLooters’ SQL Injection & XSS Attacks
February 13, 2024
Post image
Guide to SCA and SAST: Secure Your Code Efficiently
February 8, 2024
Post image
Minimize AppSec Effort and Maximize AppSec Coverage with Pipelineless Security Scanning
January 23, 2024
Post image
How to prioritize third-party package (SCA) vulnerabilities
November 28, 2023
Post image
CI/CD Pipeline Security vs. IDE plugins vs. Pipelineless Security
November 27, 2023
Post image
Why Risk Scanning Needs to be Free: Don't Just Find Risks, Fix Them
November 20, 2023
Post image
How to Evaluate a Static Application Security Testing (SAST) Solution
November 13, 2023
Post image
A Complete Guide: Enterprise Managed Users vs Bring Your Own Users on GitHub
October 17, 2023
Post image
How to Determine the Severity of a Third-Party Risk with Software Composition Analysis (SCA)
September 27, 2023
Post image
SBOM For Your Software Supply Chain: Added Visibility or Security Risk?
September 19, 2023
Post image
How to ensure you don’t have Sourcegraph secrets in source code
September 4, 2023
Post image
How to ensure your third-party software packages are reputable
August 16, 2023
Post image
How to prioritize your backlog of hardcoded secrets
July 18, 2023
Post image
Why Secret Scanning Visibility Should Be Free & Understanding Where There is Value
July 11, 2023
Post image
Detecting & Preventing Source Code Exfiltration
July 5, 2023
Post image
Should I Manage Code in a Single Organization or Multiple Organizations?
June 27, 2023
Post image
The Criticality of Context for Addressing Software Supply Chain Risk
June 19, 2023
Post image
What Developers Can Learn from Taylor Swift's Re-recording Strategy
June 12, 2023
Post image
Best Practices for Source Code Secret Detection
May 30, 2023
Post image
How insurance tech companies are leading the way on Application Security
May 3, 2023
Post image
Trying to identify spoofing in GitHub? May the 4th be with you!
May 3, 2023
Post image
How We Converted a GitHub Tool Into a General Purpose Webhook Proxy to Supercharge Our Integration Development
April 17, 2023
Post image
Adopting Pipelineless Security Solutions for Modern AppSec Programs
April 10, 2023
Post image
Defending Against Source Code Exfiltration, Fast and Slow
April 5, 2023
Post image
Importance of EPSS for Vulnerability Management
March 28, 2023
Post image
What is a Software Bill of Materials (SBOM)?
March 22, 2023
Post image
Harnessing the Power of Secure Coding Practices for Effective CI/CD Security
February 13, 2023
Post image
Best Practices for a Secure Development Environment
January 11, 2023
Post image
Managing Azure DevOps Access Levels & Permissions
January 10, 2023
Post image
Security to-do lists slow you down, security tools need to fix the problems they find
December 19, 2022
Post image
Leveraging Developer Security Skills to Fortify your Security Team
December 14, 2022
Post image
What is Pipelineless Security?
December 5, 2022
Post image
Choosing GitHub Runners vs Self-Hosted Runners
November 8, 2022
Post image
What to Consider Before Enforcing Multi-Factor Authentication (MFA) on GitHub
October 19, 2022
Post image
Trouble Keeping Track of Your Keys? So Does Toyota: Lessons Learned from a Key Management Breach
October 12, 2022
Post image
Hardening Your Software Development Environment: A Beginner's Guide
September 21, 2022
Post image
Four takeaways from the NSA's software supply chain security recommendations
September 10, 2022
Post image
Analyzing LastPass' Recent Security Incident Notification
August 26, 2022
Post image
Demystifying the Pl0x GitHub attack
August 17, 2022
Post image
GitHub CODEOWNERS: A Developer’s Code Review Guide
July 23, 2022
Post image
Protecting Stale Code Repositories on GitHub: Essential Security Measures
July 18, 2022
Post image
Hacking Upstream: Finding a 0-Day in an OpenSSH Key Parser Library
July 6, 2022
Post image
GitGoat: An Open Source Project of Intentionally (Riskless) Misconfigured GitHub Organizations
June 27, 2022
Post image
Tracing the Impact of a Clothing Retailer's Software Supply Chain Breach on Your Production Environment
May 25, 2022
Post image
The Importance of Free Secret Detection, Even for Private Repositories
May 11, 2022
Post image
Github OAuth Apps Security: How to protect yourself against GitHub/OAuth Apps Supply Chain Attacks
April 11, 2022
Post image
How to Survive a State Actor's Attempt to Put a Backdoor in Your Code
March 7, 2022
Post image
Application Security vs. Software Supply Chain Security: What's the Difference?
February 27, 2022
Post image
How Top Open Source Projects Protect Their Code: Insights and Best Practices
February 7, 2022
Post image
Afraid of your source code leaking? I can tell by the Twitch in your eye…!
January 10, 2022
Post image
Hacking Hacker News: Lessons Learned from a Security Researcher Wearing A Growth Hat
January 2, 2022
Protecting Your Business from Supply Chain Attacks: Expert Q&A
April 7, 2023
Developers Extension Security Team: A New Approach to Ensuring Secure Code
March 1, 2023
How to Reduce Code Risk Using Pipelineless Security
February 27, 2023
Best Secure software development solutions: our top picks
January 9, 2023
Interview with Nir Veltman – Arnica
November 21, 2022
Securing the Modern Software Supply Chain
November 9, 2022
Arnica raises $7M to improve software supply chain security
October 31, 2022
Arnica raises $7 million to secure software supply chain
October 26, 2022
Atlanta startup Arnica raises $7M as it enters growing cybersecurity market
October 26, 2022
How Arnica’s tool keeps supply chain and developers flowing by repelling attacks
October 25, 2022
With $7M in funding, Arnica is using behavioral analytics to spot hackers posing as developers
October 25, 2022
Arnica raises $7M to secure software supply chains with behavior-based threat detection and least-privilege enablement
October 25, 2022
Arnica Raises $7 Million to Protect Software Developers, Code
October 25, 2022
Interview with Nir Valtman, CEO and Founder of Arnica
October 11, 2022
Enhancing the Security of the Software Supply Chain through Secure Software Development Practices
September 14, 2022
Biden issues Executive Order to strengthen nation’s cybersecurity networks
May 13, 2021
Cybersecurity 101: Protect your privacy from hackers, spies, and the government
January 21, 2021