hard coded secrets in code
Managing the Risks of Hard-Coded Secrets
Secrets in code refer to software's most sensitive organizational information—things like passwords, API keys, tokens, and cryptographic keys embedded...
security compliance with codacy
How to Ensure Security Compliance in Modern Software Development
Non-compliance is a concept that should send a chill down the spine of any product leader. It can lead to genuinely company-ending ramifications. In...
devops vs devsecops
DevOps vs. DevSecOps: Understanding the Difference for Enhanced Security
Our 2024 State of Software Quality research confirms what many organizations already know: software security is paramount. The research shows that 84%...
codacy g2 badges
Codacy Named Industry Leader in G2 Spring 2024 Report
We’re excited to announce that Codacy has once again been recognized as an industry leader by G2.
dependency vulnerability scanning for java
Dependency Vulnerability Scanning Now Supports Java
Late last year, we added insecure dependencies detection to Codacy, enabling our users to identify insecure open-source components used within their...
code covage vs test coverage
Code Coverage vs. Test Coverage: What’s the Difference? 
A software development team that takes code quality seriously prioritizes metrics like “code coverage" and "test coverage" when evaluating its work....

Subscribe
to our blog

Stay updated with our monthly newsletter.