Plexicus Academy

Long-form security education
for the era of vibe coding.

Ten essential articles on AI-native ASPM — fundamentals, compliance, deep dives, and threat research. New articles published every two weeks throughout 2026.

Q1 priority reading list

10 articles · ~150 min total
Fundamentals Drafting

What is ASPM?

Application Security Posture Management — the category, the buyers, and why every CISO has it on their 2026 roadmap. Read this if you've heard the acronym and want a one-page primer that doesn't require a vendor demo.

12 min read Notify me →
Battle card Drafting

Aikido vs Plexicus — the 50-developer cost reality

Aikido caps its free tier at 2 developers and charges $35–$105 per extra developer above 10. We charge €0 per developer at every tier. Walking through the math at 50 devs makes the pricing model visible.

8 min read Notify me →
Compliance Drafting

NIS2 for AppSec teams

NIS2 Directive Article 21 imposes specific software-supply-chain security requirements on essential and important entities across the EU. What it actually says, who it applies to, and what evidence you need to produce.

18 min read Notify me →
Deep dive Drafting

Beyond pattern-matching SAST

Why pattern-matching SAST tools surface noise and miss exploits, and what deep semantic code analysis does differently — unifying syntax, control flow, and data dependence into a queryable understanding of the codebase. The difference between "this looks suspicious" and "this is exploitable".

22 min read Notify me →
Developer guide Drafting

Secure vibe coding — a developer guide

Cursor, Copilot, Claude Code, Windsurf, Devin, Replit — the AI assistants your team uses ship vulnerable code by default. A practical guide to keeping productivity high while the security posture holds.

14 min read Notify me →
Compliance Coming soon

DORA Article 28 — the third-party register deadline

Digital Operational Resilience Act in financial services. The Article 28 third-party register deadline is June 2026. What goes in the register, how Plexicus produces the evidence, and what an audit actually looks at.

16 min read Notify me →
Threat research Coming soon

AI Pentest — proving exploitability with real PoCs

The difference between a SAST finding (theoretical) and an AI Pentest finding (a working PoC running against your sandbox). Why your board will only fund the fixes for the second kind.

11 min read Notify me →
Compliance Coming soon

CRA — the Cyber Resilience Act for software vendors

The EU's Cyber Resilience Act mandates secure-by-design and vulnerability handling for nearly all software sold in the EU after 2027. What "secure by design" means in audit terms, and what changes about your SBOM workflow.

19 min read Notify me →
Threat research Coming soon

Slopsquatting — when your AI imports a package that doesn't exist

LLMs hallucinate package names. Attackers publish real packages with those names. The result is a supply-chain attack vector unique to the AI-coding era. How to detect, how to block, and what we found scanning 10,000 Lovable apps.

10 min read Notify me →
Deep dive Coming soon

The autonomous loop — Scan → Filter → Fix → Pentest → Understand

Why every other AppSec product stops at "Filter". The five stages of the Plexicus autonomous loop, what each one actually does, and why closing the loop without a human in the middle is the 2026 product bar.

20 min read Notify me →

New articles every two weeks.

The Academy publishes long-form education on AI-native ASPM, EU compliance, deep semantic code analysis, and threat research. No newsletter spam — we publish only when the article is worth your time.

Ready when you are

Stop paying per developer.
Start closing the loop.

Plexicus is the AI-native ASPM that scans, filters, fixes, pentests, and explains — autonomously. Unlimited developers, unlimited repos, fair-use AI actions. Real free tier, €269/mo annual when you're ready.