Categories
Category //

CxSCA

Checkmarx – Making Waves Once Again

In organizations that encourage the usage of modern application development techniques to expedite the development, delivery, and deployment of custom software applications, the likelihood of open source libraries, components, modules, etc. being pulled into a code base by developers is

Developer’s Guide to Open Source Spring Cleaning

Spring is here, and after a year filled with record-setting digital transformation and its associated vulnerabilities, now is the right time to give the open source components in your codebase a refresh. For many development teams, today’s open source operations present a

Exploitable Path – Advanced Topics

This is the third and final blog on Exploitable Path – a unique feature that allows our customers to prioritize vulnerabilities in open-source libraries. In the first blog, we introduced the concept of Exploitable Path and its importance. The conclusion

Skip to content