In its 2019 Hype Cycle for Application Security report, Gartner revealed a new, “high-priority” category called Application Security Orchestration and Correlation (ASOC). ASOC delivers three primary benefits to the AppSec process within organizations, including efficiency, scalability, and accountability.
Code Dx announced that two of its experts will be speaking at the OWASP Foundation’s Global AppSec EU in Amsterdam this week. CEO, Dr. Anita D’Amico and AppSec Researcher Chris Horn.
Code Dx, Inc. today announced that CRN®, a brand of The Channel Company, has named Code Dx to its 2019 Emerging Vendors list in the Security category.
Code Dx Enterprise now lets users identify, prioritize and manage their network/ infrastructure vulnerabilities in addition to weaknesses found in their applications. Code Dx Enterprise 4.2 also offers two-way Jira integration, further automating the vulnerability management processes.
Read the interview with Dr. D’Amico to learn more about how Code Dx works.
Code Dx will be on presenting at the 28th Software & Apps Development Expo (Japan IT Week Spring and Tokyo Big Sight) exhibition all week. We will be at booth section Booth A41-13 on May 8-10.
Code Dx CEO Dr. Anita D'Amico, PhD, was featured in an article and interviewed by Cybercrime Magazine. You can read the article by Steven T. Kroll at CyberSecurity...
An article by Ken Prole, CTO of Code Dx, was published in the Security Today magazine’s April 2019 edition.
Web application attacks are on the rise. A recent study found that they were the primary cause of reported breaches in 2017 and Q1 2018. This marked increase is partly due to the greater variety in web application vulnerabilities, as new attack vectors are found and exploited.
Hybrid Analysis combines the best aspects of the two most common types of application security testing— SAST and DAST—to provide a deeper, more effective look under your application’s hood. SAST tools scour your source code for potential vulnerabilities—from the inside-out—while DAST tools search for exploits accessible by an attacker—from the outside-in.