Cycode Complete ASPM
  • Products
    COMPLETE ASPM PLATFORM

    ASPM

    Discover and manage all security tooling and data across your SDLC from one central platform

    Pipeline & Build security

    Defend your software supply chain

    Application Security Testing (AST)

    Reduce risk across your entire code with modern AST approach

    Posture Management

    Ingest & understand your security posture
    By Use Case

    Secrets Detection

    Continuously scan, detect and remediate every hidden secret across your SDLC and developer productivity tools

    CI/CD Security

    Proactively monitor and prevent supply chain attacks in your CI pipeline

    Source Code Leakage

    Centrally manage governance & security policies across all your DevOps tools

    Container Scanning

    Container security from development to deployment
     

    SCA (open source security)

    Find all open source vulnerabilities across your entire SDLC with Software Composition Analysis

    SAST (code security)

    Zero in on, and fix vulnerabilities in custom developed code

    IaC

    Prevent cloud misconfigurations and apply security standards to Terraform, Kubernetes, & more

    Cycode AI

    (A)chieve the (I)mpossible with a Complete ASPM Platform
     

    State of ASPM 2025

    2nd Annual research report on the challenges & strategies in ASPMDownload Report
  • Resources

    Product Security All-StarsNEW

    Meet the top leaders of 2025 who are shaping the industry through Product Security

    ASPM Book

    Published book on the future of code resilience, with interviews from 20+ CISOs and DevSecOps leaders

    Solution Briefs & Whitepapers

    Downloadable product overviews, expert guides, and in-depth reports

    State of ASPM 2025NEW

    2nd Annual research report on the challenges & strategies in ASPM

    ASPM Trailblazers (Videos)NEW

    Video series covering everything you need to know in AppSec

    Analyst Research

    Reports & analyst research on ASPM

    Blog8 NEW this month

    Learn & stay up to date on developments in ASPM

    ASPM University

    Ultimate educational destination for ASPM, curated learning hub with videos, articles & guides from top experts

    Cygives

    Community hub for free & open developer security tools

    The 2025 Product Security All-Stars

    Meet the top leaders shaping the industry through Product Security.Read The Interviews Now
  • Customers
  • Integrations
  • Company

    About Us

    Who are we and what we stand for

    Partners

    The Collaboration Partner Program helps organizations secure software supply chains

    Press & Media

    Hear what the world says about us in the news

    Events

    One stop shop for all Cycode’s events

    Careers

    Learn about career opportunities at Cycode

    Contact Us

    Write us and we promise to get back to you

    Securing Software
    Development In The AI Era

    Join us to learn how security experts are evolving strategies to secure the software the world depends on.Register Now
Login Get a Demo
Skip to content

Free Trial

Hardcoded Secrets

A Secrets Management Maturity Model

April 3, 2024January 14, 2022 by Jon Jarboe
Read More

Maturity models may be a controversial topic, but used properly we believe they can help leaders understand their capabilities and develop a roadmap for improvement.

Categories BLOG Tags Code Leakage, Governance, Hardcoded Secrets, Hardening SDLC, Software Supply Chain Security Leave a comment

Cycode Integration with JFrog Pipelines and Artifactory

April 3, 2024December 31, 2021 by Tony Loehr
Read Now

JFrog and Cycode created an integration that will improve the security of our customers’ digital assets and dependencies.

Categories BLOG Tags Asset Inventory, Code Leakage, Code Tampering, Hardcoded Secrets, Hardening SDLC, IaC Security, SLSA, Software Supply Chain Security Leave a comment

AWS CloudFormation Security: 8 Best Practices

June 20, 2024November 17, 2021 by Tony Loehr
AWS cloudformation security

AWS CloudFormation gives organizations the ability to easily manage a collection of AWS resources by automating the initialization, provisioning, and…

Categories BLOG Tags Code Leakage, Governance, Hardcoded Secrets, IaC Security, Least Privilege Enforcement, Software Supply Chain Security Leave a comment

7 Terraform Security Best Practices

February 26, 2025November 2, 2021 by Tony Loehr
Cover Image

Terraform, developed by Hashicorp, is an infrastructure as code (IaC) framework that allows for declarative resource provisioning…

Categories BLOG Tags Governance, Hardcoded Secrets, IaC Security, Software Supply Chain Security Leave a comment

8 Infrastructure as Code (IaC) Best Practices for Security

April 3, 2024October 7, 2021 by Tony Loehr
Cover Image

Infrastructure as Code (IaC) is a rapidly growing technique of provisioning infrastructure with software, utilizing software…

Categories BLOG Tags Code Leakage, Code Tampering, Governance, Hardcoded Secrets, IaC Security, Least Privilege Enforcement, Software Supply Chain Security Leave a comment

Why Developers are Hackers’ New Targets (and What to do About it)

April 3, 2024August 3, 2021 by Orion Cassetto
Cover Image

Compromised credentials are a tried-and-true tactic for hackers looking to gain access to secured systems, including personal accounts, corporate networks, SaaS applications and even development environments.

Categories BLOG Tags Code Tampering, Governance, Hardcoded Secrets, Hardening SDLC, Least Privilege Enforcement, Software Supply Chain Security Leave a comment

How to Setup Branch Protection Rules in Azure DevOps

April 29, 2025May 26, 2021 by Tomer Almog
Branch name pattern

Branch protection rules are a crucial part of securing source control management systems. Branch protection rules enable administrators…

Categories BLOG Tags Code Tampering, Governance, Hardcoded Secrets, Hardening SDLC, IaC Security, Software Supply Chain Security Leave a comment

The Codecov Breach – Development Infrastructure is the Weakest Link & its Now Rapidly Being Exploited

April 3, 2024April 20, 2021 by Amnon Even-Zohar
Cover Image

On April 15th, Codecov disclosed a major breach when an attacker compromised its infrastructure allowing to export sensitive information like…

Categories BLOG Tags Code Tampering, Hardcoded Secrets, Hardening SDLC, Software Supply Chain Security Leave a comment

ESLint: Compromising the Build using Supply Chain Attack

April 3, 2024February 18, 2021 by Amnon Even-Zohar
Cover Image

A supply-chain attack is an indirect attack which targets the tools, automatic software updates or supply chain in general, in order to introduce malicious code or dependencies into existing software, without the developers being aware.

Categories BLOG Tags Code Tampering, Hardcoded Secrets, Least Privilege Enforcement, Software Supply Chain Security Leave a comment

A Unique Supply Chain Attack: The 2020 Sawfish

April 3, 2024January 31, 2021 by Amnon Even-Zohar
Cover Image

For attackers targeting technology businesses, the goal is often stealing intellectual property and other data, which can either be sold for profit…

Categories BLOG Tags Code Leakage, Code Tampering, Hardcoded Secrets, IaC Security, Least Privilege Enforcement, Software Supply Chain Security Leave a comment
Older posts
Newer posts
← Previous Page1 Page2 Page3 Next →

RELATED CONTENT

  • 5 Reasons to Attend ASPM’verse: Securing Software Development in the AI Era
  • How to Put ASPM into Practice and Improve Outcomes: 3 Takeaways from Gartner’s New Research
  • What Is Code Security? Strategies to Prevent Vulnerabilities
  • SAST vs DAST: What’s the difference?
  • Vibe Coding: Leveraging AI-Assisted Programming

Recent Comments

    Get a Live Tour of The
    Complete Approach to ASPM

    Book a Demo
    • Platform
      • ASPM – Application Security Posture Management
      • Secrets Scanning
      • Next-Gen SCA – Software Composition Analysis
      • Source Code Leakage Detection
      • Source Control & CI/CD Security
      • SAST – Static Application Security Testing
      • Infrastructure as Code (IaC) Security
      • Container Security Scanning
      • Cycode AI – Achieve the Impossible
      • ASPM Marketplace – Connectors & Integrations
      • Application Security – Reduce risk across your entire code with modern AST approach
      • ConnectorX – Ingest & understand your security posture
      • Cimon – Build Hardening and Artifact Integrity
    • Resource center
      • ASPM Book
      • State of ASPM 2025
      • Blog
      • ASPM Trailblazers
      • Solution Briefs
      • Analyst Research
      • AppSec Best Practices
      • Cygives
      • ASPM – Guide
      • ASPM University
    • COMPANY
      • About Us
      • Customers
      • Partners
      • Press & Media
      • Security & Trust
      • Events
      • CareersHIRING
      • Contact Us
    • COMPARE
      • GitGuardian
      • Snyk
      • GitHub Advanced Security
      • Checkmarx
    • legal
      • Terms Of Use
      • Privacy Policy
      • Cookie Policy
      • Status Page
      • Sitemap

    SIGN UP FOR OUR NEWSLETTER

    By signing up I confirm I have read Cycode's Privacy Policy and agree to receive newsletters and updates from Cycode's blog.

    Copyrights

    ® 2025. Cycode Ltd. All Rights Reserved.

    • social_icon
    • social_icon
    • social_icon
    • social_icon
    • social_icon
    © 2025 Cycode • Built with GeneratePress