PinnedHallucinative-Insecure GPT Code GenerationWhen AI Code Assistants Start Seeing Unicorns in Your CodeJun 12, 2023Jun 12, 2023
PinnedCodeThreat AI AssistantIntroducing CodeThreat AI Assistant, Personal Code Analysis Expert.Apr 28, 20231Apr 28, 20231
CodeThreat GenAI — Code Fix LLM Integration OnIdentifying vulnerabilities is only the beginning. The real value lies in what happens next.Jan 22Jan 22
Software Development Life Cycle: SAST and SCA CombinedUnderstanding SCA and SAST: A Practical Guide for Real-World Software SecurityJan 13Jan 13
Sensitive Information Detection in MLOps: Why It Matters More Than EverIn our journey as a startup, we’ve always been driven by the needs of our users and customers. And what we’ve observed lately is a…Nov 9, 2023Nov 9, 2023
Act Against Security AnomaliesExpect and act against abnormal security related behaviors in your codeDec 12, 2022Dec 12, 2022
Security Watchouts for Redis ClientsWhen the scalability and performance become the main goal in our business, in-memory caching systems are one of the items we look for to…Sep 27, 2022Sep 27, 2022
Is OWASP Benchmark Any Good?Strong and not-so strong sides of using it for your SAST benchmarks…May 27, 20222May 27, 20222