Codific
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • SAMMY Versions
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Customers
    • Zebra Technologies
    • Sigma Software Group
    • Sign In Solutions
    • Kiloverse
    • Approach Cyber
    • All Customer Stories
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP
    • Codific @ OWASP Global AppSec Washington D.C. 2025
    • Careers
  • Partners
    • Implementation Partners Program
      • Partner Success Story
    • Academic Application Security Program
  • Insights
    • Blog
    • The AppSec Management Podcast
    • Application Security Science
    • Press Coverage
  • Contact
  • Go to SAMMY

AppSec

Home AppSec Page 2
ZAP in GitLab Pipeline

17

Jul

How to integrate Checkmarx ZAP in GitLab

  • Aram Hovsepyan
  • Application Security, SSDLC, zap

In this technical article, we will explore how to improve your DevSecOps processes by integrating […]

Read Article
Conceptual illustration of the SSDLC

11

Jun

What Is the SSDLC? A Guide to Secure Development

  • Nicolas Montauban

Most security issues in software stem from one simple problem: teams try to fix them[…]

Read Article
vulnerability management dashboard

26

May

Security metrics with purpose and strategic impact

  • Aram Hovsepyan
  • Application Security, Cybersecurity, Security metrics

You’ve probably heard the saying, “You can’t manage what you don’t measure.” If you are[…]

Read Article
CRA readiness analysis.

24

Apr

What to expect from EU CRA fines?

  • Dag Flachet

  Official framework, regulation and standard pages mentioned in this article CRA GDPR OWASP SAMM[…]

Read Article
Business functions of SAMM graphic

04

Apr

OWASP SAMM: A Comprehensive Introduction

  • Nicolas Montauban
  • Application Security, Application Security Management, Cybersecurity, OWASP SAMM, Security Maturity

Modern software development moves fast, and so do the security challenges that come with it.[…]

Read Article
Steps to implement OWASP SAMM graphic

04

Apr

How to implement OWASP SAMM: Tooling, Example and Mistakes to Avoid

  • Nicolas Montauban
  • Application Security, OWASP SAMM, Secure Software Development, Software security, Team Management

Understanding OWASP SAMM is only the beginning. The real value comes from using it to[…]

Read Article
Mappings to OWASP SAMM

07

Dec

NIST 800-53 and NIST 800-171: Key Differences

  • Aram Hovsepyan
  • Compliance, Cybersecurity, NIST SSDF, Privacy by Design, Security, Software security

The U.S. cybersecurity strategy seems to be lightyears ahead of the EU. I strongly believe[…]

Read Article
BSIMM (Building Security In Maturity Model): A Complete Guide

29

Nov

BSIMM (Building Security In Maturity Model): A Complete Guide

  • Nicolas Montauban
  • Application Security, BSIMM, SAMM, Security, SSDLC

Application security is a complex discipline. To make things even harder for us, it is[…]

Read Article
Comparing NIST SSDF vs SAMM

28

Nov

Comparing NIST SSDF and OWASP SAMM: A Comprehensive Analysis

  • Aram Hovsepyan
  • Application Security, BSIMM, NIST SSDF, OWASP, SAMM

Over the past year, our SAMMY tool has grown significantly. It now supports not just[…]

Read Article
fisma

22

Nov

What is FISMA and how to comply with it

  • Aram Hovsepyan
  • Application Security, Compliance, Cybersecurity

What is FISMA and why is it important? The Federal Information Security Modernization Act (FISMA)[…]

Read Article
CSF 2.0 Functions

20

Nov

What is NIST CSF 2.0 and how to implement it

  • Aram Hovsepyan
  • Application Security, Cybersecurity, Secure Software Development

Managing cybersecurity risks requires a clear strategy combining people, processes, tools, and knowledge, all guided[…]

Read Article
Mastering OWASP SAMM

02

Nov

Common mistakes when implementing OWASP SAMM

  • Aram Hovsepyan
  • Application Security, OWASP, SAMM, Secure Software Development, SSDLC

OWASP Software Assurance Maturity Model (SAMM) is one of the only comprehensive frameworks available for[…]

Read Article
Previous Next

Building a simple and safe digital future

This website runs on green hosting - verified by thegreenwebfoundation.org
  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)
  • Spotify

Main Focus

Application Security Compliance Cybersecurity NIST SSDF OWASP OWASP SAMM Privacy by Design SAMM Secure Software Development Security Software security SSDLC

Recent Post

  • Claude Code Security Excerpt

    February 24, 2026

    Claude Code Security: Will AI Disrupt Application Security?

    February 24, 2026

  • Secure Controls Framework Illustration

    January 31, 2026

    Secure Controls Framework: A Comprehensive Overview

    January 31, 2026

  • Security scopes

    December 31, 2025

    NIST SSDF 1.2 Explained

    December 31, 2025

In the Spotlight

  • SAMMY
  • The AppSec Management Podcast
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Imprint
  • Cookie Policy
  • Privacy Statement

Codific ® 2025. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}