Light Research

Software Component Analysis with AI

Last year, we introduced Software Component Analysis (SCA) as a core capability in our Application Security platform. The goal was simple but critical: extend vulnerability detection beyond first-party code and into the vast ecosystem of third-party and open-source dependencies that modern software is built on. In today’s cloud-native and AI-driven development environments, applications are rarely […]

Software Component Analysis with AI Read More »

Prioritizing Risk Assessment with Security Scores

Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System (CVSS) are two widely used scoring systems in cybersecurity, each answering a different question about vulnerabilities. EPSS tells you how likely a vulnerability is to be exploited, while CVSS tells you how bad a vulnerability is. Used together, they provide a more complete picture for

Prioritizing Risk Assessment with Security Scores Read More »

MongoDB Sharding Architecture, Design, Quick Guide

When a database needs to handle more data, more queries, or higher throughput, there are two fundamentally different approaches to scaling: Vertical Scaling and Horizontal Scaling. Vertical scaling means increasing the capacity of a single MongoDB server instance by adding more powerful hardware resources—more CPU cores, more RAM, faster disks, or larger storage. Horizontal scaling

MongoDB Sharding Architecture, Design, Quick Guide Read More »

CWE Landscape, Patterns, Correlations

Introduction Security vulnerabilities are rarely isolated incidents. In real-world systems, weaknesses tend to cluster, cascade, and compound, often stemming from the same underlying design or validation failures. As part of our research to build models that can detect and remediate vulnerabilities automatically, we analyzed the Top 25 CWEs, their scope, parent–child relationships, and correlations across

CWE Landscape, Patterns, Correlations Read More »

Understanding MITRE Att&ck Framework

The MITRE ATT&CK framework describes how real adversaries operate, not theoretical vulnerabilities. For application security teams, ATT&CK provides a powerful lens to move beyond static bug-finding toward attack-path thinking, runtime defense, and measurable risk reduction. This article walks through each core ATT&CK tactic from an AppSec-first perspective, focusing on how attacks manifest inside applications, APIs,

Understanding MITRE Att&ck Framework Read More »

Scroll to Top