Insights from application security experts and industry leaders
Which is better, eBPF or kernel modules for vulnerability detection and attack monitoring? Evidence points towards eBPF.
Effective cloud cost management can be achieved by implementing a self-managed NAT
Vulnerability Alert: CVE-2024-6387, dubbed regreSSHion, has been discovered in OpenSSH. Get remediation guidance now.
Kodem Security's Runtime-Powered SAST introduces a groundbreaking approach, reshaping the application security landscape.
Kodem’s integration with Google Cloud means we’re actively scanning, analyzing, and responding to threats in real-time, across all stages of the development lifecycle
Review software security requirements for Secure SDLC Regulations and SDLC security guidance on how to achieve compliance.
Kodem Security is thrilled to announce that it has been honored with the 2024 Fortress Award for Best Application Security Solution
Kodem Introduces Runtime-Powered Application Security Testing, New AI capabilities and Strategic Expansion of Leadership Team:
CVE-2024-3094 reveals a critical flaw in XZ-Utils, essential for data compression in software development.
Introducing Kodem Remedies, a novel security remediation mechanism that leverages full Code-to-Runtime context.
Vulnerability discovered in libwebp library which parses WebP image format. The libwebp vulnerability fix requires a runtime SBOM tool.
Discover how Generative AI, combined with runtime AI, is revolutionizing application security. By analyzing components that are in use and how data moves within them we expose only real risk.