Code Dx Application Security Blog

Gartner names Code Dx in its AppSec Hype Cycle Report

Gartner names Code Dx in its AppSec Hype Cycle Report

Code Dx has been named in Gartner’s 2019 Application Security Hype Cycle Report in a key emerging market area: Application Security Orchestration and Correlation (ASOC). Yearly, Gartner produces a report that details the current state of the Application Security Marketplace, including emerging and fading market area trends.

read more
How to manage IoT application security vulnerabilities more efficiently

How to manage IoT application security vulnerabilities more efficiently

As the number of IoT applications and devices continues to grow, so does the need for improved IoT security—yet the reality is we have a long way to go. A recent article pointed out that more than 2 million security cameras, doorbells, and even baby monitors contain serious IoT vulnerabilities. The worst part is there is no known patch for the common flaws in these everyday devices. 

read more
Common application security challenges & how to overcome them

Common application security challenges & how to overcome them

Application security challenges lie not only in the threats and application vulnerabilities themselves, but also in the processes and approaches taken within the organization to manage application security. A closer look at some of the top application security challenges from both a threat standpoint and a business management view can help you avoid some of the most common pitfalls.

read more
Vulnerability Management: Is 100% code and vulnerability coverage realistic?

Vulnerability Management: Is 100% code and vulnerability coverage realistic?

In the world of application security testing, the terms “code coverage” and “vulnerability coverage” are frequently used. But what do they really mean? Essentially, code coverage is the amount of the code that is scanned to identify potential vulnerabilities in a software application. Vulnerability coverage refers to the number of defects or system misconfigurations in the software code that could pose potential threats.

read more
The perfect union: Vulnerability Assessment and Penetration Testing  (VAPT)

The perfect union: Vulnerability Assessment and Penetration Testing (VAPT)

One hundred percent—all of the applications Positive Technologies tested—had some kind of vulnerability. You might think, “Yeah, but how many of those were real, critical vulnerabilities?” Well, ninety-four percent of web applications tested contained a high-severity software flaw. Eighty-five percent of those same applications contained at least one confirmed, exploitable vulnerability.

read more
Data, data everywhere: How to effectively manage the deluge of SAST and DAST results

Data, data everywhere: How to effectively manage the deluge of SAST and DAST results

Application security testing is an integral part of the development process. A proper testing methodology utilizes multiple tools (and types of tools) and incorporates application security testing into the design, development, and production phases of the application development lifecycle. But you may find yourself overwhelmed by the inundation of results from all of these testing tools.

read more
Code Dx Enterprise 3.0 Now Offers Static and Dynamic Hybrid Analysis for Application Security Testing

Code Dx Enterprise 3.0 Now Offers Static and Dynamic Hybrid Analysis for Application Security Testing

Code Dx, Inc. today announced a significant new capability— Static & Dynamic Hybrid Analysis—to be included in Code Dx Enterprise 3.0. In addition to Hybrid Analysis, Code Dx Enterprise 3.0 supports and integrates with more than 40 commercial and open-source SAST, DAST, and IAST tools and techniques to provide total software application vulnerability correlation and management.

read more

© Code Dx, Inc. (631) 759-3993 | Privacy Policy | Contact Us