Introducing Codacy Guardrails
AI has intertwined itself with software development. In every phase, developers are being enhanced and assisted in producing software faster.
CTO Craft Con in London: Takeaways 
I recently had the opportunity to attend and speak at the CTO Craft Con in London, a fantastic gathering of technology leaders focused on engineering...
Application Security Posture Management (ASPM): A Complete Guide
The application security (AppSec) industry is full of standalone tools, and many organizations rely on a combination of these tools to address security...
cross site scripting attacks
Understanding Cross-Site Scripting Attacks and How to Prevent Them
Cross-site scripting attacks, or XSS, are one of the most prevalent and devastating security risks today. XSS attacks target vulnerable web pages with...
vulnerability in rule files
Vulnerability in Rules Files With Hidden Unicode Characters
Pillar Security, a cybersecurity company specializing in securing the entire lifecycle of artificial intelligence (AI) applications, just released...
what is code coverage?
Code Coverage: A Complete Guide
Building software is similar to building a skyscraper. It’s a meticulous process that demands precision, foresight, and attention to detail. Imagine...

Subscribe
to our blog

Stay updated with our monthly newsletter.