Codacy Security (7)

dependency vulnerability scanning for java
Codacy Dependency Vulnerability Scanning Now Supports Java
Late last year, we added insecure dependencies detection to Codacy, enabling our users to identify insecure open-source components used within their...
compliance and security
The Intersection of Compliance and Security in Software Development
It's easy to talk about security posture in software development. Implementing one is another thing entirely. "Security" is such a nebulous concept...
CRA and open source
How Will the Cyber Resilience Act (CRA) Impact the Open-Source Community?
The European Union Cyber Resilience Act (CRA), expected to take effect in 2024, aims to establish strict cybersecurity requirements for software and...
cloud security posture management guide
Cloud Security Posture Management (CSPM): A Complete Guide
According to recent research by Flextera, companies are turning to the cloud to run their workloads at an accelerated pace. Their2024 State of the...
sast tools
A Comprehensive Guide to Implementing SAST Tools
In 2023, the number of data breaches hit a record high of 3,205 incidents — a shocking 78% increase compared to the previous year. As data attacks...
evolving devsecops
Evolving DevSecOps to Protect Against New Threats Associated with AI and ML
It’s genuinely hard to overstate AI's effect on software security. Even taking away AGI and the paperclip problem, AI opens up so many new vectors for...

Subscribe
to our blog

Stay updated with our monthly newsletter.