<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Maria</title>
    <description>The latest articles on DEV Community by Maria (@mariaxyg).</description>
    <link>https://dev.to/mariaxyg</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1251688%2F257e4665-72ea-40e8-a525-9ce5d0f052b0.jpg</url>
      <title>DEV Community: Maria</title>
      <link>https://dev.to/mariaxyg</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mariaxyg"/>
    <language>en</language>
    <item>
      <title>Join Our Webinar: SAST Isn’t Enough! Why Runtime Is Where Risk Lives</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Tue, 24 Mar 2026 10:12:03 +0000</pubDate>
      <link>https://dev.to/mariaxyg/join-our-webinar-sast-isnt-enough-why-runtime-is-where-risk-lives-1o90</link>
      <guid>https://dev.to/mariaxyg/join-our-webinar-sast-isnt-enough-why-runtime-is-where-risk-lives-1o90</guid>
      <description>&lt;p&gt;Most teams rely on static analysis to catch vulnerabilities. But here’s the problem: many issues don’t exist until your app actually runs.&lt;/p&gt;

&lt;p&gt;Code looks safe. Dependencies look clean. Pipelines pass… and still, vulnerabilities show up in production.&lt;/p&gt;

&lt;p&gt;Because real risk = behavior, not just code. So what’s missing?&lt;/p&gt;

&lt;p&gt;You need both perspectives:&lt;/p&gt;

&lt;p&gt;SAST → what’s in your code&lt;br&gt;
DAST → how it behaves at runtime&lt;/p&gt;

&lt;p&gt;Only together do they show what’s actually exploitable.&lt;/p&gt;

&lt;p&gt;We’re breaking this down live&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why static analysis alone leaves blind spots&lt;/li&gt;
&lt;li&gt;What vulnerabilities only appear at runtime&lt;/li&gt;
&lt;li&gt;How to prioritize real risk (not just alerts)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;📅 April 7 — 17:00 (CEST)&lt;br&gt;
👉 &lt;a href="https://www.linkedin.com/events/7442142589463519232/" rel="noopener noreferrer"&gt;https://www.linkedin.com/events/7442142589463519232/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Modern AppSec isn’t about more scans. It’s about a better context.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>productivity</category>
      <category>devops</category>
      <category>security</category>
    </item>
    <item>
      <title>Fix smarter, not more</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Tue, 24 Mar 2026 10:05:39 +0000</pubDate>
      <link>https://dev.to/mariaxyg/fix-smarter-not-more-2fo2</link>
      <guid>https://dev.to/mariaxyg/fix-smarter-not-more-2fo2</guid>
      <description>&lt;p&gt;Most teams today don’t struggle to detect vulnerabilities—they struggle to prioritize them effectively. With signals coming from SAST, SCA, secrets, and CI/CD tools, the real challenge is understanding what actually matters: what’s exploitable, what’s reachable, and what can be fixed safely without breaking workflows. Instead of relying only on severity, teams are moving toward risk-based remediation, combining context, exploitability, and stability while reducing noise and automating fixes through PRs. If you’re dealing with alert fatigue or slow remediation cycles, this checklist is a good starting point → &lt;a href="https://go.xygeni.io/ai-driven-remediation-risk-prioritization-checklist" rel="noopener noreferrer"&gt;https://go.xygeni.io/ai-driven-remediation-risk-prioritization-checklist&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devops</category>
      <category>security</category>
      <category>development</category>
    </item>
    <item>
      <title>Fixing vulnerabilities isn’t the hard part. Choosing the right ones is.</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Mon, 23 Mar 2026 12:21:45 +0000</pubDate>
      <link>https://dev.to/mariaxyg/fixing-vulnerabilities-isnt-the-hard-part-choosing-the-right-ones-is-4dk1</link>
      <guid>https://dev.to/mariaxyg/fixing-vulnerabilities-isnt-the-hard-part-choosing-the-right-ones-is-4dk1</guid>
      <description>&lt;p&gt;Most teams today don’t struggle to detect vulnerabilities—they struggle to prioritize them effectively. With signals coming from SAST, SCA, secrets, and CI/CD tools, the real challenge is understanding what actually matters: what’s exploitable, what’s reachable, and what can be fixed safely without breaking workflows. Instead of relying only on severity, teams are moving toward risk-based remediation, combining context, exploitability, and stability while reducing noise and automating fixes through PRs. If you’re dealing with alert fatigue or slow remediation cycles, this checklist is a good starting point → &lt;a href="https://go.xygeni.io/ai-driven-remediation-risk-prioritization-checklist" rel="noopener noreferrer"&gt;https://go.xygeni.io/ai-driven-remediation-risk-prioritization-checklist&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devops</category>
      <category>security</category>
      <category>development</category>
    </item>
    <item>
      <title>AI Is Writing Your Code. Who’s Reviewing the Security?</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Thu, 26 Feb 2026 15:16:48 +0000</pubDate>
      <link>https://dev.to/mariaxyg/ai-is-writing-your-code-whos-reviewing-the-security-11pa</link>
      <guid>https://dev.to/mariaxyg/ai-is-writing-your-code-whos-reviewing-the-security-11pa</guid>
      <description>&lt;p&gt;AI copilots like GitHub Copilot and Cursor can generate production-ready code in seconds, and autonomous agents can refactor entire modules without human review. Development velocity has never been higher—but neither has the risk surface.&lt;/p&gt;

&lt;p&gt;Most teams still rely on CI-only security scanning, which detects vulnerabilities after code is merged, when fixing issues is slower, riskier, and more expensive.&lt;/p&gt;

&lt;p&gt;In this live session &lt;a href="https://www.linkedin.com/events/7432784645383110656/" rel="noopener noreferrer"&gt;𝐕𝐢𝐛𝐞 𝐂𝐨𝐝𝐢𝐧𝐠 𝐖𝐢𝐭𝐡𝐨𝐮𝐭 𝐑𝐞𝐠𝐫𝐞𝐭: 𝐒𝐞𝐜𝐮𝐫𝐢𝐧𝐠 𝐂𝐨𝐩𝐢𝐥𝐨𝐭𝐬 𝐚𝐧𝐝 𝐀𝐈 𝐀𝐠𝐞𝐧𝐭𝐬 𝐟𝐫𝐨𝐦 𝐭𝐡𝐞 𝐈𝐃𝐄&lt;/a&gt;, we’ll show how security can move into the IDE, where AI-generated code is actually created. You’ll see how to detect vulnerabilities in real time as you code, validate reachability before merge, apply guardrails to Copilot and AI-generated changes, and safely remediate issues with AI-assisted fixes.&lt;/p&gt;

&lt;p&gt;We’ll also run a live demo securing Copilot and agent-based workflows end-to-end.&lt;/p&gt;

&lt;p&gt;If you’re using Copilot, Cursor, or any AI coding tools—and pushing code to production—this session will help you avoid shipping vulnerabilities at AI speed.&lt;/p&gt;

&lt;p&gt;📅 March 11, 2026&lt;br&gt;
🎥 Live demo included&lt;br&gt;
👉 Register here: &lt;a href="https://www.linkedin.com/events/7432784645383110656/" rel="noopener noreferrer"&gt;https://www.linkedin.com/events/7432784645383110656/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>ai</category>
      <category>devops</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>EU Cyber Resilience Act in Practice Webinar</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Wed, 04 Feb 2026 10:29:33 +0000</pubDate>
      <link>https://dev.to/mariaxyg/eu-cyber-resilience-act-in-practice-webinar-1nof</link>
      <guid>https://dev.to/mariaxyg/eu-cyber-resilience-act-in-practice-webinar-1nof</guid>
      <description>&lt;p&gt;𝐄𝐔 𝐂𝐲𝐛𝐞𝐫 𝐑𝐞𝐬𝐢𝐥𝐢𝐞𝐧𝐜𝐞 𝐀𝐜𝐭 (𝐂𝐑𝐀): 𝐰𝐡𝐚𝐭 𝐢𝐭 𝐚𝐜𝐭𝐮𝐚𝐥𝐥𝐲 𝐦𝐞𝐚𝐧𝐬 𝐟𝐨𝐫 𝐝𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫𝐬?&lt;/p&gt;

&lt;p&gt;If you’re building software products in the EU, the Cyber Resilience Act is no longer just a compliance topic; it directly impacts how you design, build, and maintain software.&lt;/p&gt;

&lt;p&gt;In this practical Webinar &lt;a href="https://www.linkedin.com/events/7424751762282143744/" rel="noopener noreferrer"&gt;𝐄𝐔 𝐂𝐲𝐛𝐞𝐫 𝐑𝐞𝐬𝐢𝐥𝐢𝐞𝐧𝐜𝐞 𝐀𝐜𝐭 𝐢𝐧 𝐏𝐫𝐚𝐜𝐭𝐢𝐜𝐞&lt;/a&gt;, we’ll break down:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What the CRA really requires from development teams&lt;/li&gt;
&lt;li&gt;How those requirements translate into concrete AppSec activities&lt;/li&gt;
&lt;li&gt;How OWASP SAMM can be used as a practical framework to structure secure development without reinventing your SDLC&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is not a legal overview. It’s a technical, execution-focused session for developers, AppSec, and DevSecOps teams who need to turn regulation into real engineering work.&lt;/p&gt;

&lt;p&gt;🎙️ Led by &lt;a href="https://www.linkedin.com/in/aganariman/" rel="noopener noreferrer"&gt;Nariman Aga-Tagiyev&lt;/a&gt;, Cybersecurity Architect &amp;amp; OWASP SAMM Core Team member.&lt;/p&gt;

&lt;p&gt;Join if you want a clear, developer-friendly path from CRA requirements to actionable security practices &lt;a href="https://www.linkedin.com/events/7424751762282143744/" rel="noopener noreferrer"&gt;https://www.linkedin.com/events/7424751762282143744/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devops</category>
      <category>devsecops</category>
      <category>appsec</category>
    </item>
    <item>
      <title>AI Didn’t Just Change Development,It Changed How AppSec Breaks</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Tue, 20 Jan 2026 12:39:14 +0000</pubDate>
      <link>https://dev.to/mariaxyg/ai-didnt-just-change-developmentit-changed-how-appsec-breaks-3iam</link>
      <guid>https://dev.to/mariaxyg/ai-didnt-just-change-developmentit-changed-how-appsec-breaks-3iam</guid>
      <description>&lt;p&gt;AI is now deeply embedded in how software is written, tested, and shipped.&lt;br&gt;
But most application security models are still designed for a world where humans wrote the code and pipelines moved slowly.&lt;/p&gt;

&lt;p&gt;That gap is now being actively exploited. In 2025, attackers didn’t need zero-days. They abused:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automation and trusted CI/CD pipelines&lt;/li&gt;
&lt;li&gt;AI-generated code that “looks fine” in review&lt;/li&gt;
&lt;li&gt;Inherited trust across dependencies, builds, and artifacts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once malicious logic entered a trusted workflow, systems did the rest, at machine speed. We just released a new research report, &lt;a href="https://xygeni.io/resources/download-report-new-application-security-attack-trends-for-2026/" rel="noopener noreferrer"&gt;New Application Security Attack Trends for 2026&lt;/a&gt;, that breaks down what actually changed and why many traditional AppSec signals failed.&lt;/p&gt;

&lt;p&gt;What’s inside:&lt;/p&gt;

&lt;p&gt;💠How AI changed the economics of software supply chain attacks&lt;br&gt;
💠Why CVEs and static analysis missed trust-based, workflow-driven attacks&lt;br&gt;
💠How persistence shifted from access to build artifacts and outputs&lt;br&gt;
💠What attackers optimized in 2025 — and will keep optimizing in 2026&lt;br&gt;
💠Why AppSec must move from issue lists to system-level control of execution and trust&lt;/p&gt;

&lt;p&gt;This isn’t about running more scans. It’s about understanding how risk propagates when AI and automation are part of the execution path.&lt;/p&gt;

&lt;p&gt;📘 &lt;a href="https://xygeni.io/resources/download-report-new-application-security-attack-trends-for-2026/" rel="noopener noreferrer"&gt;Read the full report&lt;/a&gt;!&lt;/p&gt;

</description>
      <category>devsecops</category>
      <category>appsec</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>Software Supply Chains Under Pressure: Lessons from 2025 on Malware and AI</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Wed, 07 Jan 2026 11:27:36 +0000</pubDate>
      <link>https://dev.to/mariaxyg/software-supply-chains-under-pressure-lessons-from-2025-on-malware-and-ai-59k6</link>
      <guid>https://dev.to/mariaxyg/software-supply-chains-under-pressure-lessons-from-2025-on-malware-and-ai-59k6</guid>
      <description>&lt;p&gt;2025 marked a turning point for software supply chain security. AI-assisted malware, self-propagating attacks, and large-scale trust abuse changed how compromises move through dependencies, registries, and CI/CD pipelines.&lt;/p&gt;

&lt;p&gt;In this LinkedIn Live SafeDev Talk, practitioners break down what actually changed in 2025, why familiar assumptions no longer hold, and what development and security teams need to adapt in 2026.&lt;/p&gt;

&lt;p&gt;Join us!&lt;/p&gt;

&lt;p&gt;📅 𝐉𝐚𝐧𝐮𝐚𝐫𝐲 𝟐𝟎𝐭𝐡 | 🎥 &lt;a href="https://www.linkedin.com/events/7413934584888770564/" rel="noopener noreferrer"&gt;𝐋𝐢𝐧𝐤𝐞𝐝𝐈𝐧 𝐋𝐢𝐯𝐞&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We hope to see you there!&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>programming</category>
    </item>
    <item>
      <title>New Threats in Open Source</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Mon, 15 Dec 2025 11:25:54 +0000</pubDate>
      <link>https://dev.to/mariaxyg/new-threats-in-open-source-c12</link>
      <guid>https://dev.to/mariaxyg/new-threats-in-open-source-c12</guid>
      <description>&lt;p&gt;The open source ecosystem has just crossed a new red line: we’re no longer dealing with “simple” malicious packages, but with self-spreading worms, AI-orchestrated attacks, and large-scale abuse of OSS infrastructure happening simultaneously. &lt;br&gt;
&lt;a href="https://www.linkedin.com/in/luis-rodr%C3%ADguez-xygeni/" rel="noopener noreferrer"&gt;Luis Rodríguez&lt;/a&gt; (Co-Founder &amp;amp; CTO at Xygeni Security) examines how Shai-Hulud and Shai-Hulud 2.0 turned npm into a worm-friendly propagation network, jumping even into Maven Central, how GlassWorm hid executable JavaScript in invisible Unicode with a blockchain-backed C2 and full RAT capabilities, how a real-world espionage campaign used an LLM as the primary operator for reconnaissance, exploitation, and exfiltration, and how massive spam waves like IndonesianFoods exploited funding systems and polluted registries at unprecedented scale. &lt;br&gt;
This isn’t theoretical anymore: every developer machine is now a potential worm propagation point, and every stolen token a lateral-movement catalyst. Dive into the full article “&lt;a href="https://xygeni.io/articles/new-threats-in-open-source-worms-ai-driven-malware-and-trust-abuse/?utm_source=devto&amp;amp;utm_medium=post&amp;amp;utm_campaign=Article" rel="noopener noreferrer"&gt;New Threats to the Open Source Ecosystems: Worms, AI-Cooked Malware, and Large-Scale Trust Abuse&lt;/a&gt;” to understand where supply chain threats are heading—and what must change in our defensive strategies. &lt;/p&gt;

&lt;p&gt;𝐁𝐮𝐢𝐥𝐝 𝐒𝐚𝐟𝐞, 𝐒𝐡𝐢𝐩 𝐒𝐭𝐫𝐨𝐧𝐠.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>devsecops</category>
      <category>appsec</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Open Source, AI and the New Attack Surface - Webinar</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Thu, 13 Nov 2025 09:03:35 +0000</pubDate>
      <link>https://dev.to/mariaxyg/open-source-ai-and-the-new-attack-surface-webinar-mp5</link>
      <guid>https://dev.to/mariaxyg/open-source-ai-and-the-new-attack-surface-webinar-mp5</guid>
      <description>&lt;p&gt;🚀 𝐒𝐚𝐟𝐞𝐃𝐞𝐯 𝐓𝐚𝐥𝐤: 𝐎𝐩𝐞𝐧 𝐒𝐨𝐮𝐫𝐜𝐞, 𝐀𝐈 &amp;amp; 𝐓𝐡𝐞 𝐍𝐞𝐰 𝐀𝐭𝐭𝐚𝐜𝐤 𝐒𝐮𝐫𝐟𝐚𝐜𝐞: 𝐖𝐞𝐚𝐩𝐨𝐧𝐢𝐳𝐞𝐝 𝐂𝐨𝐝𝐞, 𝐒𝐦𝐚𝐫𝐭𝐞𝐫 𝐃𝐞𝐟𝐞𝐧𝐬𝐞𝐬&lt;br&gt;
Join experts from Red Hat, TikTok, and &lt;a href="https://xygeni.io/" rel="noopener noreferrer"&gt;Xygeni &lt;/a&gt;for a live discussion on how to stay resilient in this new landscape.&lt;/p&gt;

&lt;p&gt;🗓 When: 𝐍𝐨𝐯𝐞𝐦𝐛𝐞𝐫 𝟐𝟔𝐭𝐡&lt;br&gt;
⏰ Time: 𝟏𝟐:𝟎𝟎 𝐄𝐃𝐓 / 𝟏𝟖:𝟎𝟎 𝐂𝐄𝐒𝐓&lt;br&gt;
🎙 Speakers:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/rozhukov/" rel="noopener noreferrer"&gt;Roman Zhukov&lt;/a&gt;: Security &amp;amp; Privacy Leader, Red Hat&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/leonjohnson/" rel="noopener noreferrer"&gt;Leon Johnson&lt;/a&gt;: Offensive Security &amp;amp; Privacy Lead, TikTok&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/luis-rodr%C3%ADguez-xygeni/" rel="noopener noreferrer"&gt;Luis Rodríguez Berzosa&lt;/a&gt;: CTO, Xygeni&lt;/p&gt;

&lt;p&gt;If you’re building or securing software, this one’s for you.&lt;br&gt;
&lt;a href="https://www.linkedin.com/events/opensource-aiandthenewattacksur7394295821254602752/" rel="noopener noreferrer"&gt;Register here&lt;/a&gt; and join the conversation.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>devops</category>
    </item>
    <item>
      <title>The Rise of AIO Application Security Platforms</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Wed, 29 Oct 2025 10:41:10 +0000</pubDate>
      <link>https://dev.to/mariaxyg/the-rise-of-aio-application-security-platforms-1l6h</link>
      <guid>https://dev.to/mariaxyg/the-rise-of-aio-application-security-platforms-1l6h</guid>
      <description>&lt;p&gt;𝐃𝐨 𝐲𝐨𝐮 𝐤𝐧𝐨𝐰 𝐰𝐡𝐲 𝐓𝐨𝐨𝐥 𝐒𝐩𝐫𝐚𝐰𝐥 𝐢𝐬 𝐊𝐢𝐥𝐥𝐢𝐧𝐠 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲?&lt;br&gt;
Modern engineering teams move fast. Security? Too often, it slows everything down.&lt;/p&gt;

&lt;p&gt;Not because AppSec isn't important, but because AppSec has become complicated: Multiple scanners. Multiple dashboards. Duplicate alerts.&lt;br&gt;
Noise everywhere, and real risks get buried.&lt;br&gt;
Sounds familiar?&lt;/p&gt;

&lt;p&gt;🔥 𝐓𝐡𝐞 𝐀𝐩𝐩𝐒𝐞𝐜 𝐏𝐫𝐨𝐛𝐥𝐞𝐦 𝐍𝐨 𝐎𝐧𝐞 𝐖𝐚𝐧𝐭𝐬 𝐭𝐨 𝐀𝐝𝐦𝐢𝐭&lt;br&gt;
Developers are drowning in:&lt;/p&gt;

&lt;p&gt;💠Alert fatigue&lt;br&gt;
 💠Repeated findings across tools&lt;br&gt;
 💠Disconnected vulnerability data&lt;br&gt;
 💠Manual tickets for every tiny issue&lt;br&gt;
 💠Tools that don’t integrate into workflows&lt;/p&gt;

&lt;p&gt;Security wants stronger coverage. Engineering wants fewer blockers.&lt;br&gt;
Leadership wants risk down without slowing delivery.&lt;/p&gt;

&lt;p&gt;Current tool chains usually don’t solve that tension; they create it.&lt;/p&gt;

&lt;p&gt;𝐓𝐡𝐞 𝐍𝐞𝐰 𝐀𝐩𝐩𝐫𝐨𝐚𝐜𝐡: 𝐀𝐈𝐎 𝐀𝐩𝐩𝐒𝐞𝐜 𝐏𝐥𝐚𝐭𝐟𝐨𝐫𝐦𝐬 &lt;br&gt;
Teams are shifting from scattered tools → to unified platforms that cover:&lt;/p&gt;

&lt;p&gt;💠SAST&lt;br&gt;
 💠SCA&lt;br&gt;
 💠IaC scanning&lt;br&gt;
 💠Secrets detection&lt;br&gt;
 💠SBOM &amp;amp; Supply Chain security&lt;br&gt;
 💠ASPM visibility&lt;br&gt;
 💠AI-assisted remediation workflows&lt;/p&gt;

&lt;p&gt;𝐎𝐧𝐞 𝐩𝐥𝐚𝐜𝐞. 𝐎𝐧𝐞 𝐭𝐫𝐮𝐭𝐡. 𝐎𝐧𝐞 𝐩𝐢𝐩𝐞𝐥𝐢𝐧𝐞.&lt;/p&gt;

&lt;p&gt;This is where AppSec finally starts working with developers, not against them.&lt;/p&gt;

&lt;p&gt;𝐖𝐡𝐚𝐭’𝐬 𝐃𝐫𝐢𝐯𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐡𝐢𝐟𝐭?&lt;br&gt;
Here are the trends shaping the future:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;𝐀𝐈 𝐅𝐢𝐱 𝐒𝐮𝐠𝐠𝐞𝐬𝐭𝐢𝐨𝐧𝐬 &amp;amp; 𝐑𝐢𝐬𝐤 𝐒𝐜𝐨𝐫𝐢𝐧𝐠&lt;br&gt;
No more guessing. Focus on the vulnerabilities that actually matter.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐨𝐧 𝐛𝐲 𝐃𝐞𝐟𝐚𝐮𝐥𝐭&lt;br&gt;
Policy enforcement, alert routing, and remediation SLAs are handled automatically.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;𝐑𝐞𝐠𝐮𝐥𝐚𝐭𝐨𝐫𝐲 𝐏𝐫𝐞𝐬𝐬𝐮𝐫𝐞 𝐈𝐬 𝐑𝐢𝐬𝐢𝐧𝐠&lt;br&gt;
DORA, NIS2, SEC rules → require traceable security from code → prod.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞 𝐁𝐮𝐢𝐥𝐭 𝐈𝐧𝐭𝐨 𝐃𝐞𝐯𝐎𝐩𝐬&lt;br&gt;
Security becomes the system, not an afterthought.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This isn’t a tool upgrade, it’s a mindset shift for the entire software lifecycle.&lt;/p&gt;

&lt;p&gt;Grab our Free Ebook! We put together a full breakdown of this evolution:&lt;/p&gt;

&lt;p&gt;➡️ &lt;a href="https://xygeni.io/resources/download-ebook-the-rise-of-aio-application-security-platforms/utm_source=devto&amp;amp;utm_medium=post" rel="noopener noreferrer"&gt;𝐓𝐡𝐞 𝐑𝐢𝐬𝐞 𝐨𝐟 𝐀𝐈𝐎 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐏𝐥𝐚𝐭𝐟𝐨𝐫𝐦𝐬&lt;/a&gt;&lt;br&gt;
How to simplify AppSec, eliminate alert fatigue, and actually improve delivery speed.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>appsec</category>
      <category>devsecops</category>
      <category>softwaredevelopment</category>
    </item>
    <item>
      <title>💥 Join our New SafeDev Talk - AI Unleashed: Navigating Emerging Threats and Defenses in Application Security</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Fri, 10 Oct 2025 07:28:34 +0000</pubDate>
      <link>https://dev.to/mariaxyg/join-our-new-safedev-talk-ai-unleashed-navigating-emerging-threats-and-defenses-in-application-g1m</link>
      <guid>https://dev.to/mariaxyg/join-our-new-safedev-talk-ai-unleashed-navigating-emerging-threats-and-defenses-in-application-g1m</guid>
      <description>&lt;p&gt;Artificial Intelligence is transforming Application Security (AppSec), powering both next-generation attacks and cutting-edge defenses.&lt;br&gt;
From polymorphic malware and AI-crafted injections to runtime model tampering and prompt injection exploits, the AppSec landscape is changing fast. Join us for a session where we’ll explore how AI is reshaping the security battlefield, and what you can do to stay ahead.&lt;/p&gt;

&lt;p&gt;Event Details:&lt;/p&gt;

&lt;p&gt;📅 Date: October 22nd&lt;br&gt;
⏰ Time: 16:00 (CEST) / 10:00 (EDT)&lt;br&gt;
🎥 Format: Live on LinkedIn&lt;/p&gt;

&lt;p&gt;🎙 Speakers:&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/atanas-nikolov-0a24096a/" rel="noopener noreferrer"&gt;Atanas Nikolov&lt;/a&gt; — DevSecOps Expert, Cybersecurity Program Alumni @ RNDC Bulgaria&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/jesus-cuadrado/" rel="noopener noreferrer"&gt;Jesús Cuadrado&lt;/a&gt; — CPO @ Xygeni&lt;/p&gt;

&lt;p&gt;🔗 Register now to secure your spot → &lt;a href="https://www.linkedin.com/events/aiunleashed-navigatingemergingt7382047771396104192/" rel="noopener noreferrer"&gt;https://www.linkedin.com/events/aiunleashed-navigatingemergingt7382047771396104192/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Some of the Things that you May Learn:&lt;/p&gt;

&lt;p&gt;🔹 Emerging AI-driven threats: polymorphic malware, model tampering, and prompt injection attacks&lt;br&gt;
🔹 AI-powered defenses: smarter vulnerability detection and real-time threat mitigation&lt;br&gt;
🔹 How to secure AI components within your applications and CI/CD pipelines&lt;br&gt;
🔹 Integrating AI threat awareness into security policies and developer workflows&lt;br&gt;
🔹 Practical steps to future-proof your AppSec strategy&lt;/p&gt;

&lt;p&gt;AI is no longer just a tool: it’s a new attack surface and a new defense frontier.&lt;br&gt;
This session will help you navigate that duality with confidence and clarity.&lt;/p&gt;

&lt;p&gt;➡ &lt;a href="https://www.linkedin.com/events/aiunleashed-navigatingemergingt7382047771396104192/" rel="noopener noreferrer"&gt;Register Now for the Live Event&lt;/a&gt;&lt;/p&gt;

</description>
      <category>programming</category>
      <category>cybersecurity</category>
      <category>appsec</category>
      <category>devops</category>
    </item>
    <item>
      <title>𝐔𝐩𝐜𝐨𝐦𝐢𝐧𝐠 𝐖𝐞𝐛𝐢𝐧𝐚𝐫: 𝐀𝐈 𝐀𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐀𝐮𝐭𝐨𝐦𝐚𝐭𝐢𝐨𝐧!</title>
      <dc:creator>Maria</dc:creator>
      <pubDate>Mon, 22 Sep 2025 13:38:22 +0000</pubDate>
      <link>https://dev.to/mariaxyg/--4d7h</link>
      <guid>https://dev.to/mariaxyg/--4d7h</guid>
      <description>&lt;p&gt;AppSec folks: feeling overwhelmed by noise and manual triage?&lt;br&gt;
Dev teams: tired of security slowing you down? Let’s fix that!&lt;/p&gt;

&lt;p&gt;We’re hosting a hands-on webinar to show how &lt;a href="https://www.linkedin.com/events/7375842799042248704/" rel="noopener noreferrer"&gt;AI can automate application security&lt;/a&gt; and deliver real, dev-friendly auto-remediation.&lt;/p&gt;

&lt;p&gt;What You'll See:&lt;/p&gt;

&lt;p&gt;💠Secrets, OSS vulns, and code issues auto-fixed in seconds&lt;br&gt;
 💠How to focus on real risks using EPSS &amp;amp; reachability&lt;br&gt;
 💠Auto-generated PRs with safe fixes (no more manual patching)&lt;br&gt;
 💠CI/CD guardrails that help, not hinder&lt;br&gt;
 💠Practical steps to secure every commit and pull request&lt;/p&gt;

&lt;p&gt;📅 Event Details:&lt;br&gt;
Date: October 8&lt;br&gt;
Time: 17:00 CEST / 11:00 EDT&lt;br&gt;
Where: Live on LinkedIn&lt;/p&gt;

&lt;p&gt;🎥 Can’t make it live? Register to get the replay!&lt;/p&gt;

&lt;p&gt;👉 Register here: &lt;a href="https://www.linkedin.com/events/7375842799042248704/" rel="noopener noreferrer"&gt;https://www.linkedin.com/events/7375842799042248704/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let’s turn security into a speed advantage!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>programming</category>
      <category>devsecops</category>
      <category>appsec</category>
    </item>
  </channel>
</rss>
