Skip to content

Free Trial

Cycode
  • Platform
    • Hardcoded Secrets Detection
      Find existing secrets across your SDLC and block new secrets in pull requests
    • Source Code Leakage Detection
      Identify suspicious behavior and detection proprietary code exposures
    • Next-Gen SCA – Pipeline Composition Analysis
      Find all vulnerable dependencies across your entire SDLC with Pipeline Composition Analysis
    • Source Control & CI/CD Security
      Centrally manage governance & security policies across all your DevOps tools
    • SAST – Static Application Security Testing
      Zero in on vulnerabilities in custom developed code
    • Code Tampering Prevention
      Combine integrity verification, anomaly detection, critical code monitoring & governance
    • Infrastructure as Code Security
      Prevent cloud misconfigurations and apply security standards to Terraform, Kubernetes, & more
  • Resources
    • Webinars
    • Whitepapers
    • Solution Briefs
    • Analyst Research
    • AppSec Best Practices
  • Blog
  • Company
    • About us
    • Partners
    • Press & Media
    • Careers
    • Contact us
  • Login
  • Book a Demo

Archives: Thank you pages

Thank you pages

Fixing Hardcoded Secrets the Developer-Friendly Way

Tampering Code Prevention

Continuous Compliance Across the SDLC

Understanding SBOMs: A Practical Guide to Implementing NIST/CISA’s Software Bill of Materials (SBOM) Requirements

Modern Development Practices Open the Door for Code Leakage

Cloud Infrastructure Configuration Is Critical to a Secure Software Supply Chain Strategy

Software Supply Chain Security: Don’t Get Your Code Tampered

The Foundational Role of Security & Governance in the Software Supply Chain

How Software Engineering Leaders Can Mitigate Software Supply Chain Security Risks

Secrets Management and DevOps: A Risk-based Approach to Eliminating Hardcoded Secrets

Post navigation
Older posts
Page1 Page2 … Page4 Next →

RELATED CONTENT

  • Cycode Discovers a Vulnerability in GitHub API Authorization – CVE-2022-46258
  • The Overlooked Secret: Cycode Expands Secrets Detection Capabilities
  • Detecting and Mitigating Source Code Compromise in the Wake of the CircleCI Incident
  • Security Advisory: CircleCI Security Breach
  • Cycode Collaborates with CodeSee to Secure the Pipelines of Thousands of Open-Source Projects

Recent Comments

    Get a Live Tour of Cycode The Application Security Platform

    Book a Demo
    • Platform
      • Hardcoded Secrets Detection
      • Source Code Leakage Detection
      • Next-Gen SCA – Software Composition Analysis
      • Source Control & CI/CD Security
      • SAST – Static Application Security Testing
      • Code Tampering Prevention
      • Infrastructure as Code Security
    • Resource center
      • Resources
      • Blog
      • AppSec Best Practices
    • COMPANY
      • About us
      • Partners
      • Press & Media
      • Careers
      • Contact Us
    • legal
      • Terms Of Use
      • Privacy Policy
      • Cookie Policy
      • Status Page

    SIGN UP FOR OUR NEWSLETTER

    By signing up I confirm I have read Cycode's Privacy Policy and agree to receive newsletters and updates from Cycode's blog.

    Copyrights

    © 2022. Cycode Ltd. All Rights Reserved.

    Follow Us:
    © 2023 Cycode • Built with GeneratePress