Join Codacy Product Showcase on July 9th to learn about product updates

Group 370

Meet us at WeAreDevelopers World Congress in Berlin

Group 370

Spotlight Whitepaper by IDC on Importance of Automated Code Review Technologies

Group 370

Codacy Security

security compliance with codacy
How to Ensure Security Compliance in Modern Software Development
Non-compliance is a concept that should send a chill down the spine of any product leader. It can lead to genuinely company-ending ramifications. In...
devops vs devsecops
DevOps vs. DevSecOps: Understanding the Difference for Enhanced Security
Our 2024 State of Software Quality research confirms what many organizations already know: software security is paramount. The research shows that 84%...
dependency vulnerability scanning for java
Codacy Dependency Vulnerability Scanning Now Supports Java
Late last year, we added insecure dependencies detection to Codacy, enabling our users to identify insecure open-source components used within their...
compliance and security
The Intersection of Compliance and Security in Software Development
It's easy to talk about security posture in software development. Implementing one is another thing entirely. "Security" is such a nebulous concept...
CRA and open source
How Will the Cyber Resilience Act (CRA) Impact the Open-Source Community?
The European Union Cyber Resilience Act (CRA), expected to take effect in 2024, aims to establish strict cybersecurity requirements for software and...
cloud security posture management guide
Cloud Security Posture Management (CSPM): A Complete Guide
According to recent research by Flextera, companies are turning to the cloud to run their workloads at an accelerated pace. Their2024 State of the...

to our blog

Stay updated with our monthly newsletter.