Codacy Security (2)

ci/cd security best practices
CI/CD Pipeline Security Best Practices
Continuous Integration/Continuous Development (CI/CD) pipelines lie at the core of the DevSecOps philosophy. CI/CD streamlines software delivery by...
open source license scanning
Open Source License Scanning: A Complete Guide
Building software with open-source components isn’t always the best idea. Licenses dictate how you can use, change, or share these components. And if...
best practices for writing clean code
Best Practices for Writing Clean Code
Clean code is similar to a well-written article. Good articles possess certain characteristics that make them a pleasure to read: clear and accessible...
assigning coding standards
New Feature: Assigning Multiple Coding Standards to a Single Repository 
We’re excited to share a major update: you can now assign multiple coding standards to a single repository.
technical due diligence for startups
Technical Due Diligence for Startups: A Complete Guide
Investors love big ideas. But they need proof that the technology underneath can actually handle the job. A flashy pitch means nothing if the systems...
vulnerability prioritization
Vulnerability Prioritization: A Complete Guide
Security vulnerabilities are a constant threat to organizations of all sizes. Often discovered through Common Vulnerabilities and Exposures (CVEs),...

Subscribe
to our blog

Stay updated with our monthly newsletter.