Kodem

Documents & Videos

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime. Kodem's runtime-powered application security platform eliminates unnecessary noise, providing a fast, best-in-class accuracy set of findings.

Register

The State of Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs.

Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Based on qualitative and quantitative responses of industry security leaders, practitioners, developers and DevOps professional

Download Report

Executive Brief

Learn about Runtime Intelligence and our eBPF sensor technolog.

Uncover the dynamic features of the Kodem' sensor technology, powered by our proprietary Runtime Intelligence. See how Kodem provides security analysis across the entire application stack with the innovative use of eBPF.

Register

Executive Brief

Dynamic SBOMs for Agile
and AI Applications

This brief explores the technical specifications, regulatory implications, and strategic applications of these vital tools. Learn why dynamic SBOMs are essential components of a proactive cybersecurity strategy.

Register

Google Cloud Partner

See How Kodem Secures Your Google Cloud Workloads

Through its integration with Google Cloud, Kodem enables proactive detection, allowing real-time scanning, analysis, and response to threats across your development lifecycle.

Register

Get the Pitch

Skip the fluff and dive straight into our 4-minute product pitch.

Let's cut through the typical sales talk and show you exactly how our runtime application security platform exposes vulnerabilities across code, containers, and APIs. See how it empowers your team to stop complex attack chains that other tools miss.

Register

Kodem Overview

Learn how the application’s journey from code to runtime influences behaviors, components, interactions, and risks in a 2-page overview. Kodem's unified platform offers a comprehensive view powered by deep application context, which is crucial for both security and engineering.

Download

Interviews & Podcasts

Interview

Hear a lively discussion with de-FUD podcast hosts @Nancy Wang, Venture Partner, Felicis, and @Ashish Popli, RiskEyeQue as they chat with Aviv Mussinger about cloud security, the right way to shift left... and cake 😀

Direct Link to Watch

Interview

Hear the CEO of Kodem Security discuss the Kodem platform and our innovative approach to application security. Learn about Kodem's mission, vision and impact on the industry.

Watch Now

Podcast

In this episode of "30 Minutes on: Vulnerability Management," host James Berthoty interviews Aviv Mussinger, CEO and Co-Founder of Kodem. Aviv shares his journey, highlighting how his deep-rooted interest in technology led to a career in application security that revolutionized the field.

Listen Now

AIrwaves Podcasts

Episode 1

AI in Security Workflows

James Berthoty and Surag Patel, CEO of Pixee, discuss the role of AI in application security and the challenges of integrating AI into security solutions. Both emphasize the importance of understanding the problem before deciding to use AI and highlight the need for AI to be additive and specific in its application. The conversation also delves into the use of AI in baselining and the considerations for using AI in security workflows.

Watch Now

Episode 2

The Path to MLBOM

James Berthoty interviews Jacob Barkay, a product security architect at Edwards Life Sciences. They discuss the impact of large language models (LLMs) on product security, especially in regulated industries like healthcare. Jacob emphasizes the importance of ensuring the security of LLMs, transparency, and rigorous checks. He highlights the evolving nature of AI security standards and the need for data scientists to understand these risks.

Watch Now

Episode 3

Prompt Injections and Beyond

In this conversation, James Berthoty talks with Elad Shulman, CEO and co-founder of Lasso Security. Elad emphasizes the importance of understanding and mitigating risks associated with GenAI, such as data leaks, manipulation of models, prompt injections and unknown threats. They also touch on how different teams within organizations approach AI security and the evolving use cases for AI in enterprises.

Watch Now

Episode 4

Hacking with AI

Joseph Thacker, Principal AI Engineer at AppOmni, discusses how AI and LLMs can boost creativity in tasks like testing and bug bounties by offering a variety of solutions. To maximize AI's effectiveness, Joseph emphasizes the importance of providing it with extensive context, ensuring the AI tool has a clear understanding of what’s being evaluated. When applying AI to active web applications, he highlights the need for a decision-making core that can effectively process key elements such as the host, path, and other contextual information. This deeper understanding enables AI to make more accurate and informed assessments, enhancing its overall performance in cybersecurity tasks.

Watch Now