Kodem named Winner of Top Infosec Innovators Award for Application Security
We're excited to share that Kodem Security has won the 2024 Top InfoSec Innovators Award in the Application Security category!



Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine, annually spotlights the industry’s top innovators, and we’re honored to be recognized for our unique approach to application security.
Kodem Security’s runtime-powered application security platform goes beyond traditional tools by analyzing applications within live environments, giving organizations the insight they need to address actual vulnerabilities and attack paths. By integrating static application security testing (Runtime SAST), software composition analysis (SCA security), and infrastructure as code (IaC) security, we deliver a unified solution that enables real-time threat detection and remediation.
This award acknowledges Kodem’s dedication to innovation and impact on providing real actionable results reducing frustration and minimizing wasted time enabling engineers to focus on development. Our approach empowers organizations to tackle evolving threats with precision, helping developers build secure applications more efficiently.
Thank you, Cyber Defense Magazine, for this honor, and to our community for supporting our mission to redefine application security!

More blogs
From Reachability to Reality: Proving Vulnerable Code was Executed & Exploited in Production
Memory analysis plays a critical role in turning kernel-level signals into function-level proof of execution. See which vulnerable functions actually run in your environment, cut noise and prioritize risk that exists (and is exploitable) in your running application.
Vulnerability Alert CVE-2025-4665: Critical Pre-Auth SQL Injection in WordPress Contact Form Database Plugin (CFDB7)
CVE-2025-4665 is a critical (CVSS 9.6) pre-authentication SQL injection vulnerability in the WordPress Contact Form CFDB7 Database Addon plugin. The flaw allows remote attackers to exploit insufficient input validation and unsafe deserialization without authentication, affecting versions 1.3.2 and earlier. This vulnerability enables data exfiltration, database manipulation and potential remote code execution through PHP object injection chains.
A Primer on Runtime Intelligence
See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.
Platform Overview Video
Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.
The State of the Application Security Workflow
This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.
.png)
Get real-time insights across the full stack…code, containers, OS, and memory
Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus
A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.
