1

New Research Report - Exploring the 2024 State of Software Quality

Group 370
2

Codacy Product Showcase October 8th - Sign Up to Learn About Platform Updates

Group 370
3

Spotlight Whitepaper by IDC on Importance of Automated Code Review Technologies

Group 370
java vulnerabilities
11 Common Java Vulnerabilities and How to Avoid Them
Java is a cornerstone of modern software development, powering everything from enterprise-level applications to Android apps and large-scale data...
dast tools
Navigating DAST Tools
Research by Statista shows that data breaches more than doubled between 2020 and 2023. As a result, more organizations are using application security...
infrastructure as code (IaC)
Infrastructure as Code (IaC): A Complete Guide
The need for software development teams to create, test, and deploy applications quickly and efficiently has never been greater. Traditionally, setting...
sast dast iast rasp
SAST, DAST, IAST, and RASP: Key Differences and How to Choose
Our 2024 State of Software Quality report shows that more software teams are using automated application security testing to address increasing cyber...
hard coded secrets in code
Managing the Risks of Hard-Coded Secrets
Secrets in code refer to software's most sensitive organizational information—things like passwords, API keys, tokens, and cryptographic keys embedded...
security compliance with codacy
How to Ensure Security Compliance in Modern Software Development
Non-compliance is a concept that should send a chill down the spine of any product leader. It can lead to genuinely company-ending ramifications. In...

Subscribe
to our blog

Stay updated with our monthly newsletter.