-
June 15, 2022
5 Reasons Why Achieving Compliance in the SDLC Is Challenging for AppSec Teams
Compliance isn’t a sexy topic, but it’s often mission-critical for organizations because failure to achieve compliance can have huge repercussions....
-
May 10, 2022
Cycode Recognized as a Cool Vendor in Recent Gartner® Report
Gartner recognized Cycode as a Cool Vendor in the April 2022 Gartner® Cool Vendors™ in Application Security: Protection of Cloud-Native...
-
March 23, 2022
Software Supply Chain Security: Best Practices & Tools for 2024
Learn what a software supply chain is and what that means for security teams looking to protect them...
-
December 20, 2021
“Shadow Dev” and AppSec’s Visibility Gap
According to Gartner’s Information Technology glossary, Shadow IT refers “to IT devices, software and services outside the ownership or control...
-
November 5, 2021
Understanding the Trojan Source Attack and How to Defend Against It
There’s little doubt that 2021 has been the year of the software supply chain attack, with many notable breaches that...
-
August 3, 2021
Why Developers are Hackers’ New Targets (and What to do About it)
Compromised credentials are a tried-and-true tactic for hackers looking to gain access to secured systems, including personal accounts, corporate networks,...