Introduction to the Security Tool Challenge “Invest in Outcomes, not Tools and Capabilities” – Paul […]
In this article you will learn how to automate your secure deployment by integrating OWASP[…]
September 14, 2022, the Executive Office of the US President has released the memorandum M-22-18.[…]
Security verification is the process of confirming that a system or application is secure by[…]
Codific is proud to receive the renewal of the ISO 27001 audit certification. ISO 27001[…]
Ever heard the saying “our team is our greatest asset”. I’d dare to say that[…]
Security architecture in a nutshell The security architecture practice focuses on security during the architectural[…]
Threat modeling is the security practice that realizes the security by design principle. It draws[…]
The secure deployment of your software is a central piece in your secure software development[…]
Cybersecurity is currently a “hype”. It was a “hype” in the year 2001 and every[…]