Introduction to security in the context of outsourced development
Many organizations rely on outsourced software development to accelerate innovation, reduce costs, and acc…
Introduction to software security requirements
Despite clearly understanding the importance of security requirements, organizations seem to struggle with figuring out how …
The OWASP Software Assurance Maturity Model (SAMM) is rapidly becoming the go-to framework for application security programs, and it’s easy to see why. SAMM offers a structured…
It this article we explore the essentials of the EU Cyber Resilience Act (CRA), and dive into the details of what is required in this legislation and how organizations can demonstr…
How to use OWASP SAMM for effective communication on security?
Reporting with OWASP SAMM is very impactful when done correctly. This blog is based on first and second hand experie…
Application security is a paramount concern for organizations that develop software. However systematically managing AppSec across diverse development teams in a measurabl…
Application security requires a systematic approach and requires dealing with software security throughout every stage of the software development lifecycle (SDLC). Howeve…
At Codific we are very proud to be the main sponsor of Chess International Master Emin Ohanyan who recently won the European Rapid and Blitz Chess Championships hosted in Zagreb, C…
For the past 20 years web applications have always been the number one action vector for incidents and breaches (DBIR Verizon 2023).
OWASP SAMM offers a systematic approach to tac…