Dispatches from the AppSec Frontlines
By signing up I confirm I have read Cycode's Privacy Policy and agree to receive newsletters and updates from Cycode's blog
-
May 22, 2022 5 min read
Security Advisory: CrateDepression
Jenkins is one of the most well-known tool for creating automation pipelines and integrating them with the rest of your CI/CD tools. It has an active community that has contributed...
-
May 10, 2022 17 min read
Cycode Recognized as a Cool Vendor in Recent Gartner® Report
We’re thrilled to announce that Gartner...
-
May 4, 2022 21 min read
DevSecOps Tools: How Security Tools Improve DevOps Velocity
Jenkins is one of the most well-known tool for creating automation pipelines and integrating them with the rest of your CI/CD...
-
April 28, 2022 15 min read
The Real Cost of a Source Code Leak
For many companies, their source code is the essence of who they are. It is the foundation of any company’s intellectual...
-
April 20, 2022 12 min read
SOC 2 Type II Compliance
Jenkins is one of the most well-known tool for creating automation pipelines and integrating them with the rest of your CI/CD...
-
April 19, 2022 12 min read
GitHub OAuth Compromise Affecting Heroku and Travis-CI Users
Jenkins is one of the most well-known tool for...
-
April 19, 2022 11 min read
Lateral Movement and the Threat to Software Supply Chains
Software supply chain attacks are on the rise and growing in severity. Part of this is due to the interconnectedness of DevOps...
-
April 12, 2022 15 min read
5 Steps to Protect Code Integrity in Software Pipelines
Recently, modern software development teams have been hearing a lot about securing the software supply...
-
March 23, 2022 8 min read
What Is a Software Supply Chain—and What Does That Mean for Securing Them?
Learn what a software supply chain is and what...
-
March 22, 2022 12 min read
Hardening Your SDLC in Response to Lapsus$ Breaches
Cycode discovered critical vulnerabilities in several popular open-source projects, each of which can cause...
-
March 18, 2022 39 min read
How We Discovered Vulnerabilities in CI/CD Pipelines of Popular Open-Source Projects
Cycode discovered critical vulnerabilities in...
-
March 18, 2022 14 min read
Your Software Supply Chain Is Your Weakest Security Link
Zero-day attacks. Just the thought of them is enough to cause most security professionals’ hearts to skip a beat. Why? Because,...
Ready to get started?
We'll connect you with a Cycode expert who can share more about the product and answer any questions you have Book a Demo