@CodeDx – Better application security means better total security for an organization. Getting better application security, though, requires the use of multiple tools to perform both static and dynamic testing of those apps. It simplifies the process by bundling an assortment of static and dynamic testing tools to perform a comprehensive security analysis of an app’s code.
Software developers are depending more and more on third-party code, or dependencies, when forging their applications. Rather than reinvent the wheel for tasks such as logging and authentication, developers often deploy open-source code.
Code Dx Enterprise Wins the ASTORS Homeland Security Platinum Award for Best Cyber Security Application Management Solution
Code Dx, Inc., today announced that it won the ASTORS Homeland Security Platinum Award for Best Cyber Security Application Management Solution.
Our Code Dx Enterprise product has won the 2017 ASTORS Award for Best Cyber Security Application Management Solution. A presentation luncheon was held on November 15th.
Code Dx Version 2.6 supports NIST 800-53 Compliance and application security testing for mobile apps through NowSecure
Code Dx, Inc. today announced version 2.6 of its flagship Application Software Vulnerability Correlation and Management solution, Code Dx Enterprise.
Code Dx, Inc. CEO Dr. Anita D’Amico was asked about ways businesses could protect themselves against future ransomware events
CSO Online reached out to Code Dx, Inc. CEO Dr. Anita D’Amico for her thoughts on the future of cybersecurity and the disadvantages facing cyber defenders.
Executives at Long Island’s seedling companies said their new enterprises carry the DNA of the giants they sprang from. Here are profiles of some of those companies and their founders.
In the wake of a cyberattack that infected tens of thousands of computers around the world, Long Island cybersecurity experts said home users and small-business owners should take preventive measures to avoid similar threats.
A Twitter poll aimed at the cybersecurity community asked “Black-Hat Hackers vs. White-Hat Hackers – who’s more experienced?”