Code Dx in the News
The Info Security Products Guide recently asked a number of industry leaders to offer their thoughts and predictions on the direction of cyber security in 2018. Our CEO Dr. Anita D’Amico was included in this esteemed group.
The Code Dx team will attend the annual OWASP AppSec USA Security Conference, the premier application security conference for developers and security experts. Dr. Anita D’Amico and Chris Horn will be speaking at the conference on Friday, October 12 in the Gold Room. Their discussion will be about: Human factors that influence secure software development.
Code Dx, Inc., today announced its CEO, Dr. Anita D’Amico, has been nominated for the Cyberjutsu Award recognizing women leading change in cybersecurity. The Women’s Society of Cyberjutsu (WSC) will hold a red carpet event on August 17, 2018.
Hybrid Analysis combines the best aspects of the two most common types of application security testing— SAST and DAST—to provide a deeper, more effective look under your application’s hood. SAST tools scour your source code for potential vulnerabilities—from the inside-out—while DAST tools search for exploits accessible by an attacker—from the outside-in.
The Code Dx team was proud to provide application security training on behalf of (ISC)² at the August 2017 Metro NY branch’s workshop and training sessions. The slides are available for download.
Many Android devices are susceptible to “Android Installer Hijacking” attacks that have the potential to compromise devices and give illegitimate apps access to sensitive data. This type of attack exploits a vulnerability called “Time-of-Check to Time-of-Use...
This webinar features a leading application vulnerability correlation and management system, Code Dx.
As part of its service offerings, GB Tech has an independent verification and validation group specializing in software quality.
The 2018 Global Security Report from Trustwave found that all web applications are vulnerable to attack. Yes, you read that right. All applications had at least one vulnerability, and the average number of vulnerabilities found per application was eleven.