Codific
  • Customers
    • Zebra Technologies
    • Sigma Software Group
    • Sign In Solutions
    • Approach Cyber
    • All Customer Stories
  • Solutions
    • AppSec Management with SAMMY
    • GRC Management with SAMMY
    • Ed-Tech and HR-Tech
      • Secure Video Sharing with Videolab
      • Student Attendance Tracking with Attendance Radar
      • Survey Analysis Automation with SARA
  • Services
    • OWASP SAMM Assessments
    • OWASP SAMM Training
    • OWASP SAMM Guidance
  • Company
    • Our Story
    • Who We Are
    • Codific @ OWASP
    • Codific @ OWASP Global AppSec Washington D.C. 2025
    • Careers
  • Partners
    • Implementation Partners Program
      • Partner Success Story
    • Recommended Vendors Program
      • Our Recommended Vendors
    • Academic Application Security Program
  • Insights
    • Blog
    • The AppSec Management Podcast
    • Application Security Science
    • Press Coverage
  • Contact
  • Go to SAMMY

Security

Home Security
Nearly everything is in scope for the CRA except for SaaS

01

Dec

How to prepare for the CRA

  • Aram Hovsepyan
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

The upcoming Cyber Resilience Act (CRA) is a EU regulation that was published on November […]

Read Article
NIS 2 Blog featured image

27

Nov

NIS 2 Directive: Compliance Guide, Fines & Scope

  • Nicolas Montauban
  • Application Security Management, Compliance, Cybersecurity, Information Security

The warning shots are over. The NIS 2 Directive is live, and enforcement has begun.[…]

Read Article
OWASP ASVS Blog Illustration for Featured Image

25

Nov

OWASP ASVS: A Comprehensive Overview

  • Nicolas Montauban
  • Application Security, Application Security Management, OWASP, OWASP ASVS

As software systems grow more complex, proving that they are secure has become as important[…]

Read Article
Road illustration of a cybersecurity gap analysis journey

31

Oct

What is a Cybersecurity Gap Analysis? The Role of Mappings

  • Nicolas Montauban
  • Application Security, Cybersecurity, Security Maturity

Most organizations conduct security assessments, yet few turn them into meaningful improvement. Traditional cybersecurity gap[…]

Read Article
Managing application risk with CVE and CVSS driven dashboards

16

Oct

The Realities of AppSec Risk Management using CVE and CVSS

  • Aram Hovsepyan
  • Application Risk Management, AppSec, Common Vulnerability Enumeration, Common Vulnerability Score System

Many organizations treat Common Vulnerabilities and Exposures (CVEs) as first-class citizens. Some even enforce strict[…]

Read Article

24

Sep

Secure Code Training with Secure Code Warrior

  • Michaella Masters
  • secure code training, security training

Developers are under pressure to deliver fast, but often without the tools to build securely.[…]

Read Article
Defect Tracking diagram

28

Aug

How to Implement Security Defect Tracking with OWASP SAMM and DefectDojo

  • Nicolas Montauban
  • Defect Tracking, DefectDojo, OWASP, OWASP SAMM, Recommended Vendors, Vulnerability Management

Finding vulnerabilities is not the hard part anymore. Every build and every pipeline produces a[…]

Read Article
Kaizen as quality control for Appsec

06

Aug

Quality control for AppSec

  • Dag Flachet
  • OWASP DSOMM, OWASP SAMM, Security Maturity

By embracing the Japanese Kaizen philosophy of continuous incremental improvement, your AppSec program can evolve[…]

Read Article
OWASP DSOMM's Dimensions

30

Jul

OWASP DSOMM: A Comprehensive Introduction

  • Nicolas Montauban
  • Application Security, Application Security Management, Cybersecurity, Information Security, OWASP, OWASP DSOMM, Secure Software Development

Your DevSecOps pipeline is fast, automated, and built to scale. But is security truly integrated,[…]

Read Article
ZAP in GitLab Pipeline

17

Jul

How to integrate Checkmarx ZAP in GitLab

  • Aram Hovsepyan
  • Application Security, SSDLC, zap

In this technical article, we will explore how to improve your DevSecOps processes by integrating[…]

Read Article
Cybersecurity trends and statistics

10

Jul

Cybersecurity Statistics and Trends 2025

  • Nicolas Montauban
  • Cybersecurity, Statistics, Trends

This article contains a variety of different cybersecurity statistics and trends of 2025 and recent[…]

Read Article
Conceptual illustration of the SSDLC

11

Jun

What Is the SSDLC? A Guide to Secure Development

  • Nicolas Montauban

Most security issues in software stem from one simple problem: teams try to fix them[…]

Read Article
Next

Building a simple and safe digital future

This website runs on green hosting - verified by thegreenwebfoundation.org
  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)
  • Spotify

Main Focus

Application Security Application Security Management Compliance Cybersecurity NIST SSDF OWASP OWASP SAMM SAMM Secure Software Development Security Software security SSDLC

Recent Post

  • Nearly everything is in scope for the CRA except for SaaS

    December 01, 2025

    How to prepare for the CRA

    December 01, 2025

  • NIS 2 Blog featured image

    November 27, 2025

    NIS 2 Directive: Compliance Guide, Fines & Scope

    November 27, 2025

  • OWASP ASVS Blog Illustration for Featured Image

    November 25, 2025

    OWASP ASVS: A Comprehensive Overview

    November 25, 2025

In the Spotlight

  • SAMMY
  • The AppSec Management Podcast
  • Secure Video Sharing with Videolab
  • Attendance Radar
  • SARA
  • Terms & Conditions
  • Imprint
  • Cookie Policy
  • Privacy Statement

Codific ® 2025. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}