Skip to content

Free Trial

Cycode
  • Platform
    • Hardcoded Secrets Detection
      Find existing secrets across your SDLC and block new secrets in pull requests
    • Source Code Leakage Detection
      Identify suspicious behavior and detection proprietary code exposures
    • NextGen SCA – Software Composition Analysis new
      Find all vulnerable dependencies across your entire SDLC with Pipeline Composition Analysis
    • Source Control & CI/CD Security
      Centrally manage governance & security policies across all your DevOps tools
    • SAST – Static Application Security Testing new
      Zero in on vulnerabilities in custom developed code
    • Code Tampering Prevention
      Combine integrity verification, anomaly detection, critical code monitoring & governance
    • Infrastructure as Code Security
      Prevent cloud misconfigurations and apply security standards to Terraform, Kubernetes, & more
  • Resources
  • Blog
  • Company
    • About Us
    • Contact Us
    • Press & Media
    • Careers
  • Log In
  • Book a Demo
  • Free Trial

Knowledge Graph

Cycode Workflows: No-Code Automated Alerting & Remediation

June 8, 2022March 3, 2022 by Tony Loehr
Security Workflows

Cycode workflows allow users to automate security functions such as alerting, ticketing, and remediation that respond directly to triggered violations or vulnerabilities.

Categories BLOG Tags Software Supply Chain Security, Knowledge Graph, Hardening SDLC, Governance Leave a comment

Improve Application Security with Cycode’s Knowledge Graph and Policies

May 31, 2022February 2, 2022 by Tony Loehr
Read More

Forrester predicts insiders will cause 33% of all data exposure incidents in the upcoming year.

Categories BLOG Tags Software Supply Chain Security, Knowledge Graph, Least Privilege Enforcement, Governance Leave a comment

Terraform Cloud Drift Detection with Cycode Integration

May 31, 2022January 24, 2022 by Tony Loehr
Read More

Cycode has created an integration allowing Terraform Cloud configuration drift detection between deployment environments.

Categories BLOG Tags IaC Security, Software Supply Chain Security, Knowledge Graph Leave a comment

RELATED CONTENT

  • Security Advisory: IconBurst Attack
  • Multi-functional Threat Coverage: How Cycode handles latest Jenkins plugin vulnerabilities
  • A Strong Foundation of Governance Improves All SDLC Security Initiatives
  • All Roads Lead to Build Secrets – Or How Your Build System Could Expose The Production Environment
  • ISO 27001 Compliance

Recent Comments

    • Platform
      • Hardcoded Secrets Detection
      • Source Code Leakage Detection
      • NextGen SCA – Software Composition Analysis new
      • Source Control & CI/CD Security
      • SAST – Static Application Security Testing new
      • Code Tampering Prevention
      • Infrastructure as Code Security
    • Resource center
      • Resources
      • Blog
    • COMPANY
      • About Us
      • Press & Media
      • Careers
      • Contact Us
    • legal
      • Website Terms of Use
      • Privacy Policy
      • Cookie Policy
      • Status Page

    SIGN UP FOR OUR NEWSLETTER

    By signing up I confirm I have read Cycode's Privacy Policy and agree to receive newsletters and updates from Cycode's blog.

    Copyrights

    © 2022. Cycode Ltd. All Rights Reserved.

    Follow Us:
    © 2022 Cycode • Built with GeneratePress