PinnedHallucinative-Insecure GPT Code GenerationWhen AI Code Assistants Start Seeing Unicorns in Your CodeJun 12, 2023Jun 12, 2023
PinnedCodeThreat AI AssistantIntroducing CodeThreat AI Assistant, Personal Code Analysis Expert.Apr 28, 20231Apr 28, 20231
Software Security in ScrumApplying security practices as part of Scrum frameworkFeb 28, 2024Feb 28, 2024
CodeThreat GenAI — Code Fix LLM Integration OnIdentifying vulnerabilities is only the beginning. The real value lies in what happens next.Jan 22, 2024Jan 22, 2024
Software Development Life Cycle: SAST and SCA CombinedUnderstanding SCA and SAST: A Practical Guide for Real-World Software SecurityJan 13, 2024Jan 13, 2024
Sensitive Information Detection in MLOps: Why It Matters More Than EverIn our journey as a startup, we’ve always been driven by the needs of our users and customers. And what we’ve observed lately is a…Nov 9, 2023Nov 9, 2023
Act Against Security AnomaliesExpect and act against abnormal security related behaviors in your codeDec 12, 2022Dec 12, 2022
Security Watchouts for Redis ClientsWhen the scalability and performance become the main goal in our business, in-memory caching systems are one of the items we look for to…Sep 27, 2022Sep 27, 2022
Is OWASP Benchmark Any Good?Strong and not-so strong sides of using it for your SAST benchmarks…May 27, 20222May 27, 20222