1

New Research Report - Exploring the 2024 State of Software Quality

Group 370
2

Codacy Product Showcase: January 2025 - Learn About Platform Updates

Group 370
3

Join us at Manchester Tech Festival on October 30th

Group 370

Codacy Security (2)

keep ai generated code secure
How To Keep Your AI-Generated Code Secure
Many software developers use AI coding assistants like ChatGPT and GitHub Copilot to significantly speed up their development process, relying on them...
software dependency management
Software Dependency Management: A Complete Guide
Imagine you're assembling a wardrobe. The manual guides you through each step, but the success of your endeavor also depends on the suitable screws,...
container security
Container Security: A Complete Guide
Imagine moving to a new house, packing each box with specific items, and labeling them clearly. You want to ensure each box is secure, that nothing...
proactive SCA scans feature
New Feature: Proactive Software Composition Analysis (SCA) Scan
We’re excited to announce the launch of our proactive software composition analysis (SCA) scans, which are available to all our business-tier...
sast and dast tools for threat modeling
The Role of SAST and DAST Tools in Threat Modeling
Imagine preparing for storm season. You check your windows, bring in your bike or kids’ toys from the yard, trim your tree branches, ensure your...
server-side request forgery
Understanding Server-Side Request Forgery (SSRF) and How to Prevent It
Server-Side Request Forgery (SSRF) is a critical web vulnerability that allows attackers to trick a server into making unauthorized requests to...

Subscribe
to our blog

Stay updated with our monthly newsletter.