1

New Research Report - Exploring the 2024 State of Software Quality

Group 370
2

Codacy Product Showcase October 8th - Sign Up to Learn About Platform Updates

Group 370
3

Spotlight Whitepaper by IDC on Importance of Automated Code Review Technologies

Group 370

Codacy Security

sast and dast tools for threat modeling
The Role of SAST and DAST Tools in Threat Modeling
Imagine preparing for storm season. You check your windows, bring in your bike or kids’ toys from the yard, trim your tree branches, ensure your...
server-side request forgery
Understanding Server-Side Request Forgery (SSRF) and How to Prevent It
Server-Side Request Forgery (SSRF) is a critical web vulnerability that allows attackers to trick a server into making unauthorized requests to...
key management
Key Management: A Complete Guide
Imagine managing physical keys and passcodes for various physical locks. You have a key for the front door, another for your office, a few spares, and...
javascript vulnerabilities
Common JavaScript Vulnerabilities and How to Avoid Them
JavaScript versatility and ease of use have made it a staple in web development, from client-side scripts to server-side applications. However, with...
penetration testing for compliance
Penetration Testing for Compliance: A Complete Guide
Application security demands a thorough and multifaceted approach. Ensuring the safety of your application means testing it from every possible...
secure software development lifecycle
Secure Software Development Lifecycle (SSDLC): A Complete Guide
One key insight from our 2024 State of Code Quality report is the increasing emphasis organizations place on security to combat growing cyber threats....

Subscribe
to our blog

Stay updated with our monthly newsletter.