Codacy Security (6)

sast dast iast rasp
SAST, DAST, IAST, and RASP: Key Differences and How to Choose
Our 2024 State of Software Quality report shows that more software teams are using automated application security testing to address increasing cyber...
hard coded secrets in code
Managing the Risks of Hard-Coded Secrets
Secrets in code refer to software's most sensitive organizational information—things like passwords, API keys, tokens, and cryptographic keys embedded...
security compliance with codacy
How to Ensure Security Compliance in Modern Software Development
Non-compliance is a concept that should send a chill down the spine of any product leader. It can lead to genuinely company-ending ramifications. In...
devops vs devsecops
DevOps vs. DevSecOps: Understanding the Difference for Enhanced Security
Our 2024 State of Software Quality research confirms what many organizations already know: software security is paramount. The research shows that 84%...
dependency vulnerability scanning for java
Codacy Dependency Vulnerability Scanning Now Supports Java
Late last year, we added insecure dependencies detection to Codacy, enabling our users to identify insecure open-source components used within their...
compliance and security
The Intersection of Compliance and Security in Software Development
It's easy to talk about security posture in software development. Implementing one is another thing entirely. "Security" is such a nebulous concept...

Subscribe
to our blog

Stay updated with our monthly newsletter.