Codific
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP Global AppSec Barcelona 2025
    • Codific @ OWASP
    • Careers
  • Partners
    • Implementation Partners Program
    • Recommended Vendors Program
      • Our Recommended Vendors
    • Academic Application Security Program
  • Customers
  • Insights
  • Contact
  • Go to SAMMY

Application security insights and other exciting stories - Codific

Home Application security insights and other exciting stories
CRA readiness analysis.

24

Apr

What to expect from EU CRA fines?

  • Viki Grozdeva
What is CRA? The Cyber Resilience Act (CRA) is an EU‐wide regulation, formally Regulation (EU) 2024/2847 Ā that sets mandatory [...]
Read Article
how to do threat modeling steps

10

Apr

Master Threat Modeling with Toreon’s World-Class Approach

  • Aram Hovsepyan
  • Application Security, Application Security Management, architecture mitigation, Cybersecurity, threat modeling

Threat modeling shaped my AppSec career. It helped me wrestle with one of security’s most[…]

Read Article
Business functions of SAMM graphic

04

Apr

OWASP SAMM: A Comprehensive Introduction

  • Viki Grozdeva
  • Application Security, Application Security Management, Cybersecurity, OWASP SAMM, Security Maturity

Modern software development moves fast, and so do the security challenges that come with it.[…]

Read Article
Steps to implement OWASP SAMM graphic

04

Apr

How to implement OWASP SAMM: Tooling, Example and Mistakes to Avoid

  • Viki Grozdeva
  • Application Security, OWASP SAMM, Secure Software Development, Software security, Team Management

Understanding OWASP SAMM is only the beginning. The real value comes from using it to[…]

Read Article

24

Mar

4YFN 2025: Cybersecurity Trends

  • Mahe Pereira

As I reflect on my experience at the 4YFN conference in Barcelona, one thing stands[…]

Read Article
Application risk shown by a safe vault with cracks

25

Feb

Master OWASP SAMM Application Risk Profiles with Heeler

  • Aram Hovsepyan
  • Application Security, SAMM, Secure Software Development
Introduction: Application Risk Profile with Heeler A clear understanding of risk is the foundation of[...]
Read Article
Image of a hacker

24

Feb

A Guide on How to Not Get Hacked

  • Viki Grozdeva
  • Cybersecurity, hacking, Information Security, Security

Have you every been hacked? It sucks right? But don’t worry—now, let’s make sure it[…]

Read Article
False Claims Act

12

Feb

What Is the False Claims Act? A Comprehensive Guide to Understanding its Purpose and Impact

  • Viki Grozdeva

Fraud against government programs costs taxpayers billions of dollars every year, threatening the integrity of[…]

Read Article
Visual representation of an application security architecture with snow on top

12

Feb

Master OWASP SAMM Architecture Validation with IcePanel

  • Aram Hovsepyan
  • Application Security, SAMM, Secure Software Development
Introduction: Architecture Validation with IcePanel Architecture validation is the process of reviewing your architecture to[...]
Read Article
Contingency plan illustration

31

Jan

NIST 800-34 Contingency Planning: A Practical Guide to Resilience

  • Viki Grozdeva
  • Business Continuity, Contingency Plan, Cybersecurity, Disaster Recovery, Incident Response, nist 800-34

In today’s digital landscape, cybercrime is escalating at an alarming rate, with projected damages reaching[…]

Read Article

27

Jan

What is NIST SSDF and how should you implement it?

  • Viki Grozdeva
  • NIST, NIST SSDF, Security

In today’s rapidly evolving digital landscape, ensuring software security is more critical than ever. Recognizing[…]

Read Article
Cybersecurity Fundamentals framework in one view

12

Jan

What Is CyFun and How to Implement It?

  • Aram Hovsepyan
  • Compliance, Cybersecurity

Introduction In this blog, we will focus on helping you understand what is Cybersecurity Fundamentals[…]

Read Article
Next

Building a simple and safe digital future

  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)

Main Focus

Application Security Compliance Cybersecurity NIST SSDF OWASP Privacy by Design SAMM Secure Software Development Security Security Software Engineer Software security SSDLC

Recent Post

  • CRA readiness analysis.

    April 24, 2025

    What to expect from EU CRA fines?

    April 24, 2025

  • how to do threat modeling steps

    April 10, 2025

    Master Threat Modeling with Toreon’s World-Class Approach

    April 10, 2025

  • Business functions of SAMM graphic

    April 04, 2025

    OWASP SAMM: A Comprehensive Introduction

    April 04, 2025

In the Spotlight

  • SAMMY
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Privacy Policy

Codific Ā® 2025. All rights reserved.