Join Codacy Product Showcase on July 9th to learn about product updates

Group 370

Meet us at WeAreDevelopers World Congress in Berlin

Group 370

Spotlight Whitepaper by IDC on Importance of Automated Code Review Technologies

Group 370
security compliance with codacy
How to Ensure Security Compliance in Modern Software Development
Non-compliance is a concept that should send a chill down the spine of any product leader. It can lead to genuinely company-ending ramifications. In...
DevOps vs. DevSecOps: Understanding the Difference for Enhanced Security
Our 2024 State of Software Quality research confirms what many organizations already know: software security is paramount. The research shows that 84%...
Codacy Named Industry Leader in G2 Spring 2024 Report
We’re excited to announce that Codacy has once again been recognized as an industry leader by G2.
dependency vulnerability scanning for java
Codacy Dependency Vulnerability Scanning Now Supports Java
Late last year, we added insecure dependencies detection to Codacy, enabling our users to identify insecure open-source components used within their...
code covage vs test coverage
Code Coverage vs. Test Coverage: What’s the Difference? 
A software development team that takes code quality seriously prioritizes metrics like “code coverage" and "test coverage" when evaluating its work....
compliance and security
The Intersection of Compliance and Security in Software Development
It's easy to talk about security posture in software development. Implementing one is another thing entirely. "Security" is such a nebulous concept...

to our blog

Stay updated with our monthly newsletter.