Code Dx, Inc. today announced version 2.6 of its flagship Application Software Vulnerability Correlation and Management solution, Code Dx Enterprise.
News
CEO D’Amico on ransomware and vulnerability management
Code Dx, Inc. CEO Dr. Anita D’Amico was asked about ways businesses could protect themselves against future ransomware events
Code Dx CEO Anita D’Amico on the Future of Cybersecurity
CSO Online reached out to Code Dx, Inc. CEO Dr. Anita D’Amico for her thoughts on the future of cybersecurity and the disadvantages facing cyber defenders.
Newsday: Iconic companies of LI’s past live on in their descendants
Executives at Long Island’s seedling companies said their new enterprises carry the DNA of the giants they sprang from. Here are profiles of some of those companies and their founders.
Newsday: LI cybersecurity experts on hack attack – Be prepared
In the wake of a cyberattack that infected tens of thousands of computers around the world, Long Island cybersecurity experts said home users and small-business owners should take preventive measures to avoid similar threats.
Black hat hackers more daring and experienced than white hat hackers
A Twitter poll aimed at the cybersecurity community asked “Black-Hat Hackers vs. White-Hat Hackers – who’s more experienced?”
Cybersecurity Report shows importance of software vulnerability management
As new pieces of software are being written every day, the threat of malicious hacking continues to grow. According to a new report, there will be about 111 billion lines of new software code created this year, and with them will come billions of software vulnerabilities.
Code Dx: A Software Vulnerability Correlation and Management System
Most computer security incidents can be traced back to weaknesses in software that were inadvertently put there when the code was developed. Attackers can–and very often do–find and exploit such weaknesses as a means to attack organizations’ applications. Information security has focused primarily on network security and less on securing the software that resides on networks and poses risks. Numerous Application Security Testing (AST) tools help software developers and security analysts find vulnerabilities during all stages of the software development lifecycle, but many don’t use these tools until it’s too late.
The Top Five Names In Cybersecurity
Looking for the top names in cybersecurity? Look no further than the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies. The Q4 2016 edition was just published by Cybersecurity Ventures.
The game has changed: 13 security startups to follow on Twitter
As seen on TechBeacon While the IPO market for information security companies has been fallow in recent months, startups continue to attract cash. Sure, there's plenty of hype—there always is—but there are some interesting ideas out there, too, ideas that can help...