Code Dx Application Security Blog

Gartner names Code Dx in its AppSec Hype Cycle Report

Gartner names Code Dx in its AppSec Hype Cycle Report

Code Dx has been named in Gartner’s 2019 Application Security Hype Cycle Report in a key emerging market area: Application Security Orchestration and Correlation (ASOC). Yearly, Gartner produces a report that details the current state of the Application Security Marketplace, including emerging and fading market area trends.

read more
How to manage IoT application security vulnerabilities more efficiently

How to manage IoT application security vulnerabilities more efficiently

As the number of IoT applications and devices continues to grow, so does the need for improved IoT security—yet the reality is we have a long way to go. A recent article pointed out that more than 2 million security cameras, doorbells, and even baby monitors contain serious IoT vulnerabilities. The worst part is there is no known patch for the common flaws in these everyday devices. 

read more
Common application security challenges & how to overcome them

Common application security challenges & how to overcome them

Application security challenges lie not only in the threats and application vulnerabilities themselves, but also in the processes and approaches taken within the organization to manage application security. A closer look at some of the top application security challenges from both a threat standpoint and a business management view can help you avoid some of the most common pitfalls.

read more
Vulnerability Management: Is 100% code and vulnerability coverage realistic?

Vulnerability Management: Is 100% code and vulnerability coverage realistic?

In the world of application security testing, the terms “code coverage” and “vulnerability coverage” are frequently used. But what do they really mean? Essentially, code coverage is the amount of the code that is scanned to identify potential vulnerabilities in a software application. Vulnerability coverage refers to the number of defects or system misconfigurations in the software code that could pose potential threats.

read more
Everything you need for PCI compliance scan success

Everything you need for PCI compliance scan success

If your company handles payment transactions of any type, then you’re  familiar with the Payment Card Industry Data Security Standard (PCI DSS)—a group of security standards designed to create and maintain a secure environment for any company that accepts, processes, stores, or transmits credit card information. Because we provide tools for application security, we will focus primarily on how this regulation affects companies building applications.  

read more
The perfect union: Vulnerability Assessment and Penetration Testing  (VAPT)

The perfect union: Vulnerability Assessment and Penetration Testing (VAPT)

One hundred percent—all of the applications Positive Technologies tested—had some kind of vulnerability. You might think, “Yeah, but how many of those were real, critical vulnerabilities?” Well, ninety-four percent of web applications tested contained a high-severity software flaw. Eighty-five percent of those same applications contained at least one confirmed, exploitable vulnerability.

read more
© Code Dx, Inc. (631) 759-3993 | Privacy Policy | Contact Us | Site map