Blog
Insights from application security experts and industry leaders
A Comparative Study of Reachability Analysis in Application Security
Explore our comparative study on reachability analysis in AppSec, highlighting modern solutions that integrate static and runtime data for precise vulnerability management and prioritization.
How to Manage and Fix Security Risks Utilizing Free Tooling
DevOps security can utilize free tooling to detect hard-coded secrets, generate SBOMs, and enforce best practices.
How OpenAI o1 Changed Offensive Security
OpenAI o1 model's iterative thinking and mid-attack adaptation mark a breakthrough in AI-enhanced penetration testing.
Attack Chain Methodology: Aligning AppSec Strategies with Real-World Threats
The disconnect between traditional AppSec approaches and attack methodologies emphasizes the need for security strategies to better align with real-world threats and attack techniques.
Vulnerability Alert: Critical CUPS Vulnerability Affecting Major Linux Distributions
A group of critical vulnerabilities in the Common UNIX Printing System (CUPS) has emerged, affecting the majority of major Linux distributions.
Powerful CI and SCM Policy Updates Now Available
Powerful CI and SCM Policy Updates Ensure the Security of Builds and PRs with Remediation Guidance for Transitive Dependencies
Introducing Kodem Monorepo Support
Kodem’s Monorepo Support helps manage dependencies while ensuring consistent security and pinpointing vulnerabilities.