Code Dx in the News
Everywhere you look, people are on their smartphones. These devices have become a permanent fixture in our lives. We spend more time on our smartphones than we do on our desktops, making mobile devices a bigger target for cyber attacks. To make matters worse, the vast...
The Info Security Products Guide recently asked a number of industry leaders to offer their thoughts and predictions on the direction of cyber security in 2018. Our CEO Dr. Anita D’Amico was included in this esteemed group.
Application security testing is an integral part of the development process. A proper testing methodology utilizes multiple tools (and types of tools) and incorporates application security testing into the design, development, and production phases of the application development lifecycle. But you may find yourself overwhelmed by the inundation of results from all of these testing tools.
Code Dx has won Best Next Generation Vulnerability Management Solution at the 2018 Annual Cyber Defense Magazine InfoSec Awards! The winners were announced online and in print during the kickoff of RSA 2018 in San Francisco, April 16th.
Code Dx Enterprise 3.0 Now Offers Static and Dynamic Hybrid Analysis for Application Security Testing
Code Dx, Inc. today announced a significant new capability— Static & Dynamic Hybrid Analysis—to be included in Code Dx Enterprise 3.0. In addition to Hybrid Analysis, Code Dx Enterprise 3.0 supports and integrates with more than 40 commercial and open-source SAST, DAST, and IAST tools and techniques to provide total software application vulnerability correlation and management.
The cost and time required for comprehensive application security testing often deters businesses from implementing a proper strategy for testing and remediation of vulnerabilities. Of course, that’s asking for trouble. Fortunately, the process can be streamlined, enabling you to conduct application security testing in a more efficient and timely manner.
You’ve accepted the importance of application vulnerability testing to ensure the security of your software. That’s good. There are many options available when it comes to application vulnerability testing software, so it can become confusing to know which tools are the right ones to use. Different tools identify different problems when it comes to application vulnerability testing, so you need to consider using more than one.
New year, new security threats: The top 2017 application hacks, and what you need to look out for in 2018
2017 was no stranger to application security threats, with some of the biggest hacks, to date, taking place. In fact, during the third quarter of 2017 there were more than 230 million web application attacks on websites in the U.S. Despite these figures, a 2017 study...
White Box, Black Box, and Gray Box Vulnerability Testing: What’s the Difference and Why Does It Matter?
2017 saw a record number of security vulnerabilities, with more than 16,000 vulnerabilities reported by the end of Q3. That is more than in all of 2016 combined. While some organizations are addressing these application security risks quickly, others are failing to do...
Code Dx Enterprise Wins the ASTORS Homeland Security Platinum Award for Best Cyber Security Application Management Solution
Code Dx, Inc., today announced that it won the ASTORS Homeland Security Platinum Award for Best Cyber Security Application Management Solution.
Our Code Dx Enterprise product has won the 2017 ASTORS Award for Best Cyber Security Application Management Solution. A presentation luncheon was held on November 15th.
Gartner identifies the next step in software vulnerability management: Application Vulnerability Correlation (AVC)
You’ve learned that it takes more than one application security tool to secure your code. As you add software vulnerability testing tools to examine your application from every possible angle, the number of results you have to manage grows. It’s great that you can...
Your company has defined and implemented an application security management program. You have spent time and money purchasing and installing various Automated Software Testing (AST) tools and techniques to run your application through it’s paces. These AST tools generate lists of vulnerabilities. Why is it that you can’t just give these lists to your team and have them fix the items on the list?
You almost can’t build a web application today without making use of third-party open source code. But how do you know that code you imported into your application from GitHub is secure? If the study sponsored by our technology partner and industry leader...
Code Dx has added powerful new features to help you secure your mobile app.
Code Dx Version 2.6 Supports NIST 800-53 Compliance and Application Security Testing for Mobile Apps through NowSecure
Code Dx, Inc. today announced version 2.6 of its flagship Application Software Vulnerability Correlation and Management solution, Code Dx Enterprise.
Code Dx, Inc., today announced the release of version 2.5 of its software vulnerability correlation and management solutions providing increased flexibility for user customizations.
Code Dx, Inc. CEO Dr. Anita D’Amico was asked about ways businesses could protect themselves against future ransomware events
CSO Online reached out to Code Dx, Inc. CEO Dr. Anita D’Amico for her thoughts on the future of cybersecurity and the disadvantages facing cyber defenders.
Software vulnerabilities can cause major problems for developers and developing managers. More than 50% of all software breaches involve web applications; however, less than 10% of organizations…
Code Dx Releases Version 2.4 Offering Interactive Application Security Testing Support through Contrast Security’s Assess IAST
SAN FRANCISCO, CALIF. and NORTHPORT, N.Y. – February 13, 2017 – (RSA Conference 2017 Meeting Suite WES-19) – Code Dx,...
As new pieces of software are being written every day, the threat of malicious hacking continues to grow. According to a new report, there will be about 111 billion lines of new software code created this year, and with them will come billions of software vulnerabilities.
Most computer security incidents can be traced back to weaknesses in software that were inadvertently put there when the code was developed. Attackers can–and very often do–find and exploit such weaknesses as a means to attack organizations’ applications. Information security has focused primarily on network security and less on securing the software that resides on networks and poses risks. Numerous Application Security Testing (AST) tools help software developers and security analysts find vulnerabilities during all stages of the software development lifecycle, but many don’t use these tools until it’s too late.
As seen on TechBeacon While the IPO market for information security companies has been fallow in recent months, startups continue to attract cash. Sure, there's plenty of hype—there always is—but there are some interesting ideas out there, too, ideas that can help...
As seen on TechBeacon The US Cybersecurity National Action Plan, released in February 2016, announced that the US Department of Homeland Security (DHS) is collaborating with the Underwriters Laboratories and industry partners to develop a Cybersecurity Assurance...