Blog

October is National Cybersecurity Awareness Month. Are you giving software vulnerability management the attention it deserves?

October is National Cybersecurity Awareness Month. Are you giving software vulnerability management the attention it deserves?

DHS has declared October National Cybersecurity Awareness Month in an effort to—you guessed it—raise awareness about our shared responsibility in keeping cyberspace secure for everyone. I’m all for educating people about security threats and what they can do to prevent breaches, but there must come a time when awareness turns to action.

Software Vulnerability Management: Why it’s not as easy as “find it and fix it.”

Software Vulnerability Management: Why it’s not as easy as “find it and fix it.”

Your company has defined and implemented an application security management program. You have spent time and money purchasing and installing various Automated Software Testing (AST) tools and techniques to run your application through it’s paces. These AST tools generate lists of vulnerabilities. Why is it that you can’t just give these lists to your team and have them fix the items on the list?

My memories of Becky Bace

My memories of Becky Bace

Rebecca Gurley Bace, a member of the Advisory Board of Code Dx, Inc., died last week. While we lament her loss as an Advisor to Code Dx, Inc., that lament is dwarfed by my personal sense of loss of Becky Bace’s friendship and mentorship. Becky was truly one-of-a-kind. I met Becky about ten years ago…

Code Dx 2.4 Application Security Tool Integration

Code Dx 2.4 Application Security Tool Integration

Code Dx, version 2.4. This release includes several minor tweaks, but the two most significant additions are support for Contrast Security’s Assess IAST solution, and new filters for temporal analysis of findings across scans.

Code Dx Version 2.3 Tracks DISA STIG Compliance

Code Dx Version 2.3 Tracks DISA STIG Compliance

Data vulnerabilities can be major threats to national security. Government agencies and contractors who work with the federal government and the military must maintain strict security policies and standards with respect to data, the information systems that process...