Posts

How Conflicting Security Directives Can Leave You Without Any Oxygen

If HAL-9000 Didn’t Read Lips, Dave Bowman Wouldn’t Have Had to Spacewalk Without a Helmet Or: Why Your Application’s “I’m sorry Dave, I’m afraid I can’t do that” moment happens because you forgot to protect the pod bay doors Listen, we need to talk about HAL. Not because he’s a murderous AI with trust issues—though…

Read More...

Securing AI-Generated Code with Digital.ai Release

Introduction: AI Code Security and Its Emerging Risks Large Language Models (LLMs) and AI-assisted coding tools offer immense potential in accelerating development cycles, reducing costs, and improving productivity. However, this acceleration comes at a cost: AI-generated code introduces significant security risks, many of which remain poorly understood, inadequately mitigated, and largely unregulated. The vulnerabilities inherent…

Read More...

Why Your Security Stack is Like Baking Cookies at 10,000 Feet (And How to Stop Them From Falling Flat)

Last weekend, I spent three hours trying to bake the perfect batch of chocolate chip cookies at my home in Flagstaff. Three batches. Three disasters. Spreading like pancakes, rising too fast and collapsing, burning on the edges while staying raw in the middle. My sea-level recipe had completely failed me. Sound familiar, security engineers? As…

Read More...

The Return to Bare Metal: Why We’re Done Pretending

For the better part of two decades, we’ve been sold a story about developer productivity. The pitch went something like this: interpreted languages and high-level frameworks abstract away the complexity of systems programming, letting developers move faster and focus on business logic rather than memory management. Python, JavaScript, and their various runtime environments became the…

Read More...

How Common Is Code Obfuscation in Popular Android Apps?

Whether the goal is to steal intellectual property, gain access to sensitive user information, or access just about anything on a back end server, many targeted attacks begin with reverse engineering parts of client-side applications to gain understanding of their structure and to identify weak spots. Even if the eventual attack happens on the backend,…

Read More...

Deliver with Evidence: Safer Orchestration, Smarter Rollouts, and Scalable Processes (Release 25.3)

According to recent surveys, 31% of DevOps leaders said a lack of skilled resources is their biggest challenge while Legacy systems and infrastructure are a problem for 29% of DevOps leaders. This is because organizations are required to manage excessive amounts of tools and fragmented processes, making performance and governance standards hard to measure and…

Read More...

The Fourth Wave is Already Here: What 18 Years of Agile Data Tells Us About What’s Next

For nearly two decades, Digital.ai’s State of Agile Report has served as the industry’s pulse check on how organizations adopt, adapt, and evolve their software delivery practices. Our 18th edition reveals something remarkable: we’re not just witnessing incremental change. We’re watching the early stages of what our CEO Derek Holt calls the Fourth Wave of…

Read More...

Closing the App Security Gap: Moving Beyond Basic Security Practices

When we talk with security professionals about application protection, we get a variety of feedback ranging from “We have architected our systems with separation of concerns, we use secure coding practices, and we do SAST/DAST testing, so we’re good.” to “In spite of all the other protections we had in place, when we realized that…

Read More...

The Hidden Cost of Early AI Adoption: Why Rushing in Leads to Regret

AI is widely considered the future of software development, however, according to an MIT study, nearly 95 percent of enterprise AI initiatives fail to deliver measurable business outcomes. This is because most organizations have processes, data quality, and governance procedures that are ill-equipped to address unique challenges presented by AI. At Digital.ai, our mission is…

Read More...

Magecart is Still Here: Malicious JavaScript Keeps Advancing

In recent months, there have been numerous reports about new website attack campaigns that use injected malicious JavaScript. The Hacker News reported on a large-scale formjacking campaign where stealthy JavaScript was injected to mine cryptocurrency on end-user machines, affecting more than 3,500 websites. GBHackers highlighted a new Magecart-style campaign targeting online checkout forms. In that…

Read More...