Kodem named Winner of Top Infosec Innovators Award for Application Security

We're excited to share that Kodem Security has won the 2024 Top InfoSec Innovators Award in the Application Security category!

written by
Christine Carrig
published on
November 1, 2024
topic
Kodem News

Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine, annually spotlights the industry’s top innovators, and we’re honored to be recognized for our unique approach to application security.

Kodem Security’s runtime-powered application security platform goes beyond traditional tools by analyzing applications within live environments, giving organizations the insight they need to address actual vulnerabilities and attack paths. By integrating static application security testing (Runtime SAST), software composition analysis (SCA security), and infrastructure as code (IaC) security, we deliver a unified solution that enables real-time threat detection and remediation.

This award acknowledges Kodem’s dedication to innovation and impact on providing real actionable results reducing frustration and minimizing wasted time enabling engineers to focus on development. Our approach empowers organizations to tackle evolving threats with precision, helping developers build secure applications more efficiently.

Thank you, Cyber Defense Magazine, for this honor, and to our community for supporting our mission to redefine application security!

Blog written by

Christine Carrig

Head of Demand Generation

More blogs

View all

Kai Gets Internet Access: Turning Context Into Intelligence for Product Security Teams

For years, product security teams have lived with a gap. Tools surfaced findings — CVEs, outdated packages, risky dependencies — but rarely the context to make sense of them. Engineers still had to open a browser, type a CVE into Google, skim through NVD, vendor advisories, GitHub issues, and random blogs to answer basic questions: Is this actually exploitable in our environment? Is there a safe upgrade path? Has anyone seen this exploited in the wild? This release closes that gap.

October 15, 2025

When NPM Goes Rogue: The @ctrl/tinycolor Supply-Chain Attack

On September 15, 2025, researchers at StepSecurity and Socket disclosed a large, sophisticated supply-chain compromise in the NPM ecosystem. The incident centers around the popular package @ctrl/tinycolor (with over two million weekly downloads), but it extends far beyond: 40+ other packages across multiple maintainers were also compromised.

September 16, 2025

Malicious Packages Alert: The Qix npm Supply-Chain Attack: Lessons for the Ecosystem

The npm ecosystem is in the middle of a major supply-chain compromise. The maintainer known as Qix is currently targeted in a phishing campaign that allows attackers to bypass two-factor authentication and take over their npm account. This is happening right now, and malicious versions of widely used libraries are being published and distributed.

September 8, 2025

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus

A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.