Light Research
Home of Light Research at Pervaziv AI
Software Component Analysis with AI
Last year, we introduced Software Component Analysis (SCA) as a core capability in our Application Security platform. The goal was simple but critical: extend vulnerability…
Prioritizing Risk Assessment with Security Scores
Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System (CVSS) are two widely used scoring systems in cybersecurity, each answering a different question about…
MongoDB Sharding Architecture, Design, Quick Guide
When a database needs to handle more data, more queries, or higher throughput, there are two fundamentally different approaches to scaling: Vertical Scaling and Horizontal…
CWE Landscape, Patterns, Correlations
Introduction Security vulnerabilities are rarely isolated incidents. In real-world systems, weaknesses tend to cluster, cascade, and compound, often stemming from the same underlying design or…
Vulnerabilities and Programming Languages
Every line of software, from the first punch‑card programs to today’s AI‑generated code — carries with it the imprint of the language that created it….
Understanding MITRE Att&ck Framework
The MITRE ATT&CK framework describes how real adversaries operate, not theoretical vulnerabilities. For application security teams, ATT&CK provides a powerful lens to move beyond static…
