Codacy Security

transitive dependencies
The Risks of Transitive Dependencies in Supply Chain Security
Transitive dependencies are libraries your chosen tools rely on to function—components you didn’t pick but that you still end up needing for your...
risks of outsourced development
Understanding the Risks of Outsourced Development and How to Avoid Them
Outsourcing isn't anything new, but the practice is becoming more popular as software companies try to reduce costs and tap into a global talent pool....
code review checklist
The Ultimate Code Review Checklist For Developers
Deploying code without reviewing it first is like drinking from a dirty stream and hoping to stay healthy. Sooner or later, you'll have to deal with...
software dependency management
Software Dependency Management: A Complete Guide
Let’s say you have to build a closet. But the parts are all wrong–some of the screws are outdated, the panels do not fit as they should, and you do not...
software bill of materials SBOM
What is a Software Bill of Materials (SBOM)?
Imagine buying a complex piece of furniture with dozens of parts—screws, brackets, shelves, and hinges. To assemble it confidently, you’d need a...
manual penetration testing
A Guide to Manual Penetration Testing
In our previous post onpenetration testing, we talked about testing is essential to uncover vulnerabilities that may often go unnoticed. But...

Subscribe
to our blog

Stay updated with our monthly newsletter.