• November 10, 2022

    Shifting Security Left with the Cycode CLI

    Security doesn’t begin with developers, but they are often affected by security. In my career as a developer, I would...

    profile url
    Tony Loehr
    Developer Advocate
  • October 24, 2022

    Security Advisory: Text4Shell Attack

    The IconBurst attack is a software supply chain attack designed to grab data from apps and websites. This attack campaign...

    profile url
    Tony Loehr
    Developer Advocate
  • July 11, 2022

    Security Advisory: IconBurst Attack

    The IconBurst attack is a software supply chain attack designed to grab data from apps and websites. This attack campaign...

    profile url
    Tony Loehr
    Developer Advocate
  • June 16, 2022

    ISO 27001 Compliance

    CrateDepression is a software supply chain attack designed to target GitLab CI Pipelines by impersonating legitimate Rust packages and their...

    profile url
    Tony Loehr
    Developer Advocate
  • May 22, 2022

    Security Advisory: CrateDepression

    CrateDepression is a software supply chain attack designed to target GitLab CI Pipelines by impersonating legitimate Rust packages and their...

    profile url
    Tony Loehr
    Developer Advocate
  • May 20, 2022

    PCI DSS Compliance Requirements

    PCI DSS is a strict compliance standard, especially with respect to penalties. The potential costs of a security breach include...

    profile url
    Tony Loehr
    Developer Advocate
  • May 4, 2022

    DevSecOps Tools: How Security Tools Improve DevOps Velocity

    To support effective DevSecOps operations, organizations should consider the following difficulties in enforcing security within DevOps workflows...

    profile url
    Tony Loehr
    Developer Advocate
  • April 20, 2022

    SOC 2 Type II Compliance

    SOC 2 Type II is prescribed to organizations handling sensitive information to verify the safe handling of precious data.

    profile url
    Tony Loehr
    Developer Advocate
  • April 19, 2022

    GitHub OAuth Compromise Affecting Heroku and Travis-CI Users

    On April 15, GitHub Security announced that it experienced a software supply chain attack on many of its private repositories...

    profile url
    Tony Loehr
    Developer Advocate
  • March 15, 2022

    FedRAMP Compliance for Cloud Service Providers

    The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program serving as a framework for security assessment, authorization,...

    profile url
    Tony Loehr
    Developer Advocate
  • March 10, 2022

    Using the Principle of Least Privilege for Maximum Security

    It's a simple concept, so why doesn't every organization enforce the principle of least privilege?

    profile url
    Tony Loehr
    Developer Advocate
  • March 3, 2022

    Cycode Workflows: No-Code Automated Alerting & Remediation

    Cycode workflows allow users to automate security functions such as alerting, ticketing, and remediation that respond directly to triggered violations...

    profile url
    Tony Loehr
    Developer Advocate