PRESS RELEASE: Kodem Security Wins 2024 Fortress Cybersecurity Award for Best Application Security Solution

Kodem Security Wins the 2024 Fortress Cybersecurity Award for Best Application Security Solution
SAN FRANCISCO, CA – MAY 30, 2024 – Kodem Security announced it has been named a winner in the prestigious 2024 Fortress Cybersecurity Award presented by the Business Intelligence Group.
Kodem Security is a runtime-powered application security company established by the masterminds behind Pegasus, the world's most sophisticated spyware.
“In today's digital age, cybersecurity is no longer optional – it's essential,” said Maria Jimenez, Chief Nominations Officer at the Business Intelligence Group. “We are proud to recognize Kodem for their innovative solutions and unwavering commitment to protecting our software from ever-evolving cyber threats.”
The Fortress Cybersecurity Awards honor the world's leading companies and individuals at the forefront of cybersecurity innovation. Winners are selected based on their dedication to developing solutions, raising awareness, and defending against the growing threat of cyberattacks.
About Kodem Security
Backed by TPY Capital and Greylock Partners, Kodem Security unlocks application security teams with a runtime-powered platform that cuts false positives by 90%. Offering SAST, SCA security, and Container Scanning, with IaC scanning, Secrets Detection and ADR coming soon, Kodem ensures comprehensive protection from development to deployment. Signup for a Demo to see the power of runtime intelligence >>

About Business Intelligence Group
The Business Intelligence Group was founded with the mission of recognizing true talent and superior performance in the business world. Unlike other business award programs, these programs are judged by business executives with extensive experience and knowledge in cybersecurity. The organization's proprietary scoring system selectively measures performance across multiple security domains and rewards those companies whose achievements stand out in the fight against cybercrime.
Contacts
Mahesh Babu
Head of Marketing
Kodem Security
mahesh.babu@kodemsecurity.com
Maria Jimenez
Chief Nominations Officer
Business Intelligence Group
jmaria@bintelligence.com
More blogs

Prompt Injection Was Never the Real Problem
A review of “The Promptware Kill Chain”Over the last two years, “prompt injection” has become the SQL injection of the LLM era: widely referenced, poorly defined, and often blamed for failures that have little to do with prompts themselves.A recent arXiv paper, “The Promptware Kill Chain: How Prompt Injections Gradually Evolved Into a Multi-Step Malware,” tries to correct that by reframing prompt injection as just the initial access phase of a broader, multi-stage attack chain.As a security researcher working on real production AppSec and AI systems, I think this paper is directionally right and operationally incomplete.This post is a technical critique: what the paper gets right, where the analogy breaks down, and how defenders should actually think about agentic system compromise.

CVE-2026-21858: Ni8mare: Unauthenticated Remote Code Execution in n8n
An unauthenticated Remote Code Execution (RCE) flaw, tracked as CVE-2026-21858 (CVSS 10.0), has been discovered in n8n, the widely-adopted workflow automation platform. With over 100 million Docker pulls and an estimated 100,000 locally deployed instances, this vulnerability transforms n8n from a productivity tool into a severe single point of potential failure for organizations globally.
A Primer on Runtime Intelligence
See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.
Platform Overview Video
Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.
The State of the Application Security Workflow
This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.
.png)
Get real-time insights across the full stack…code, containers, OS, and memory
Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus
A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.


.png)