Skip to content

Free Trial

Cycode
  • Platform
    • Hardcoded Secrets Detection
      Find existing secrets across your SDLC and block new secrets in pull requests
    • Source Code Leakage Detection
      Identify suspicious behavior and detection proprietary code exposures
    • Next-Gen SCA – Pipeline Composition Analysis
      Find all vulnerable dependencies across your entire SDLC with Pipeline Composition Analysis
    • Source Control & CI/CD Security
      Centrally manage governance & security policies across all your DevOps tools
    • SAST – Static Application Security Testing
      Zero in on vulnerabilities in custom developed code
    • Code Tampering Prevention
      Combine integrity verification, anomaly detection, critical code monitoring & governance
    • Infrastructure as Code Security
      Prevent cloud misconfigurations and apply security standards to Terraform, Kubernetes, & more
  • Resources
    • Webinars
    • Whitepapers
    • Solution Briefs
    • Analyst Research
    • AppSec Best Practices
  • Blog
  • Company
    • About us
    • Partners
    • Press & Media
    • Careers
    • Contact us
  • Login
  • Book a Demo

Governance

Understanding the Trojan Source Attack and How to Defend Against It

November 22, 2022November 5, 2021 by Orion Cassetto
Cover Image

There’s little doubt that 2021 has been the year of the software supply chain attack, with many notable breaches that include Solarwinds…

Categories BLOG Tags Code Tampering, Software Supply Chain Security, Hardening SDLC, Governance Leave a comment

7 Terraform Security Best Practices

November 29, 2022November 2, 2021 by Tony Loehr
Cover Image

Terraform, developed by Hashicorp, is an infrastructure as code (IaC) framework that allows for declarative resource provisioning…

Categories BLOG Tags IaC Security, Hardcoded Secrets, Software Supply Chain Security, Governance Leave a comment

8 Infrastructure as Code (IaC) Best Practices for Security

November 28, 2022October 7, 2021 by Tony Loehr
Cover Image

Infrastructure as Code (IaC) is a rapidly growing technique of provisioning infrastructure with software, utilizing software…

Categories BLOG Tags IaC Security, Code Tampering, Hardcoded Secrets, Code Leakage, Software Supply Chain Security, Least Privilege Enforcement, Governance Leave a comment

Why Developers are Hackers’ New Targets (and What to do About it)

August 24, 2022August 3, 2021 by Orion Cassetto
Cover Image

Compromised credentials are a tried-and-true tactic for hackers looking to gain access to secured systems, including personal accounts, corporate networks, SaaS applications and even development environments.

Categories BLOG Tags Code Tampering, Hardcoded Secrets, Software Supply Chain Security, Hardening SDLC, Least Privilege Enforcement, Governance Leave a comment

Why Security Teams Consistently Fail to Implement Effective Security Controls Across the SDLC

January 31, 2023May 26, 2022 by Gil Ben-Horin

DevOps has been around for more than a decade…

Tags Software Supply Chain Security, Hardening SDLC, Governance

How to Setup Branch Protection Rules in Azure DevOps

November 28, 2022May 26, 2021 by Tomer Almog
Branch name pattern

Branch protection rules are a crucial part of securing source control management systems. Branch protection rules enable administrators…

Categories BLOG Tags Hardening SDLC, Governance, IaC Security, Code Tampering, Hardcoded Secrets, Software Supply Chain Security Leave a comment

GitHub Actions & Code Injection: Avoiding Vulnerable Configurations

January 31, 2023March 27, 2022 by cycode

As part of our research of the GitHub Actions security landscape, we discovered that in writing a perfectly secure GitHub Actions workflow, several pitfalls could cause severe security consequences…

Tags Hardening SDLC, Governance, Software Supply Chain Security

Cycode:
Source Control & CI/CD Security

January 31, 2023October 18, 2021 by Gil Ben-Horin

The last decade of application development experienced a staggering amount of innovation. Technologies like containers, Kubernetes…

Tags Hardening SDLC, Governance

Preventing Code Tampering & Verifying Integrity Across Your SDLC

January 31, 2023January 20, 2021 by Gil Ben-Horin
Watch Now

The SolarWinds breach underscores the importance of verifying the integrity of each phase of the development to prevent code…

Tags Code Tampering, Software Supply Chain Security, Hardening SDLC, Governance
Post navigation
Newer posts
← Previous Page1 Page2

RELATED CONTENT

  • Cycode Discovers a Vulnerability in GitHub API Authorization – CVE-2022-46258
  • The Overlooked Secret: Cycode Expands Secrets Detection Capabilities
  • Detecting and Mitigating Source Code Compromise in the Wake of the CircleCI Incident
  • Security Advisory: CircleCI Security Breach
  • Cycode Collaborates with CodeSee to Secure the Pipelines of Thousands of Open-Source Projects

Recent Comments

    Get a Live Tour of Cycode The Application Security Platform

    Book a Demo
    • Platform
      • Hardcoded Secrets Detection
      • Source Code Leakage Detection
      • Next-Gen SCA – Software Composition Analysis
      • Source Control & CI/CD Security
      • SAST – Static Application Security Testing
      • Code Tampering Prevention
      • Infrastructure as Code Security
    • Resource center
      • Resources
      • Blog
      • AppSec Best Practices
    • COMPANY
      • About us
      • Partners
      • Press & Media
      • Careers
      • Contact Us
    • legal
      • Terms Of Use
      • Privacy Policy
      • Cookie Policy
      • Status Page

    SIGN UP FOR OUR NEWSLETTER

    By signing up I confirm I have read Cycode's Privacy Policy and agree to receive newsletters and updates from Cycode's blog.

    Copyrights

    © 2022. Cycode Ltd. All Rights Reserved.

    Follow Us:
    © 2023 Cycode • Built with GeneratePress