SAST

Addressing cloud-native app development challenges with scalable security tools
Learn about cloud-native trends, challenges, and security solutions for organizations shifting to cloud-based environments.The post Addressing cloud-native app development challenges with scalable security tools appeared first on Blog ...

Faster, better, stronger application security for developers in the IDE
New enhancements from Code Sight enable developers to customize security scans, prioritize new issues, and close feedback loops without leaving the IDE.The post Faster, better, stronger application security for developers in the ...
Gen-AI Won’t Replace Humans – or SAST – In the SDLC
Interview with MITRE’s Tracey Bannon by industry analyst Deb Radcliff, editor of TalkSecure, hosted by CodeSecure and syndicated at Security Boulevard & YouTube Click HERE to listen. Whether people realize it or not, AI in ...
Toil Not: Automate DevOps Governance
By Deb Radcliff, DevSecOps analyst and editor of CodeSecure’s TalkSecure educational content (syndicated at Security Boulevard & YouTube) In this show, Deb interviews two innovative technologists driving the DevOps Automated Governance movement ...
Using SAST and MISRA Memory Safety Standards to Prevent the Next CrowdStrike Debacle
The Problem A common coding error in a CrowdStrike Falcon update caused critical system outages around the world starting on Friday July 19th 2024. The culprit? A Null Pointer Dereference (also known as CWE-476) in a ...

SAST – All About Static Application Security Testing
Learn about Static Application Security Testing (SAST). Understand the importance, benefits, & how to choose the right SAST tool for your org ...
White House Urges Tossing C and C++ From Critical Infrastructure Systems… and why this is not a good idea.
"the way coders do their work is of critical importance to national interest" -- white house ONCD The post White House Urges Tossing C and C++ From Critical Infrastructure Systems… and why ...
Code Complexity
“What gets measured gets managed” is a frequently quoted statement in the business world, although there seems to be some confusion as to who coined the phrase. Regardless, that statement holds true ...
Static Application Security Testing at Scale
Software security requires a holistic view across vast ecosystems of smaller systems, each with its own code set and associated vulnerabilities that need to be prevented or managed. Today’s embedded systems are ...

How to detect, prevent, and mitigate buffer overflow attacks
Learn how to detect, prevent, and mitigate buffer overflow attacks. Get best practices and tips for handling buffer overflow risks in your security program. The post How to detect, prevent, and mitigate ...