Introducing Azul Code Inventory

Your Codebase is a Cluttered Garage Full of Dead Code

| | company, developer, security
Over time unused code becomes clutter as teams refactor. Shouldn't Java developers have an easier way to identify dead code for removal? The post Your Codebase is a Cluttered Garage Full of ...
API security, API, cloud, audits, testing, API security vulnerabilities testing BRc4 Akamai security pentesting ThreatX red team pentesting API APIs Penetration Testing

Why Are APIs so Easy for Threat Actors to Exploit?

Lax API security creates the perfect window of opportunity, often with a low barrier to entry. Cybercriminals are eager to exploit it ...
Security Boulevard
Without and with Code Inventory

Code Inventory: Remove Dead Code for Easier Maintenance

Azul Code Inventory centralizes pinpoints code that doesn’t run in production and provides a treasure map of dead code that you can remove. The post Code Inventory: Remove Dead Code for Easier ...
Code maintenance lifecycle

Take the Pain Out of Your Customers’ Code Maintenance with Azul Code Inventory

Code maintenance is never prioritized. If you’re a provider of Java software developer services, your customers need a solution to dead code. The post Take the Pain Out of Your Customers’ Code ...
GitLab vulnerability password

Malware Devs Update Legion Hacktool, Boost Capabilities

A recently discovered cloud-focused malware tool has seemingly been updated with additional functionality ...
Security Boulevard
New Design, New Features: Maven Central Improvements for Developers

New Design, New Features: Maven Central Improvements for Developers

Maven Central Repository has made the biggest change to its platform since its inception.Hosted by Sonatype, Maven Central Repository is one of the largest Java repositories in the world. It has helped ...
supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

SLSA and Developer Productivity Meet in 2023

As cyberattacks rise, software organizations must proactively reduce vulnerabilities and ‘shift left’ to harden their entire software delivery life cycle (SDLC). However, most organizations cannot afford to have their security measures negatively ...
Security Boulevard
The State of Application Security with Tanya Janca

The State of Application Security with Tanya Janca

Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current ...
Hacking and Securing Python Applications

Hacking and Securing Python Applications

27 vulnerabilities to look out for in Python applications: Arbitrary file writes, directory traversal, deserialization, and more…Photo by Hitesh Choudhary on UnsplashSecuring applications is not the easiest thing to do. An application has many ...
What Developers Need to Know About the Impact of Compliance Frameworks on Software Development

What Developers Need to Know About the Impact of Compliance Frameworks on Software Development

DeepFactor's brand-new compliance module helps developers identify when vulnerabilities and security risk jeopardize compliance goals For today’s digital businesses, protecting customer data should be a top priority. However, as product teams focus ...