Back to blog

Eyal Katz

Top 10 Static Application Security Testing (SAST) Tools

Top 10 Static Application Security Testing (SAST) Tools in 2025

Updated October 21, 2024 Imagine you’re all prepared to roll out your latest feature, and suddenly, right before launch, you discover a security vulnerability concealed in

A Step-by-Step Guide to Performing a Secure Code Review

A Step-by-Step Guide to Performing a Secure Code Review

We’ve all been there—staring at code, hoping no hidden traps are waiting to cause chaos down the line. That’s where secure code reviews come in. Think

Container Runtime Security: What is it and how to set it up?

Container Runtime Security: What is it and how to set it up?

Containers have quietly become indispensable in the modern application deployment stack, revolutionizing how we build, ship, and run applications. However, with their widespread adoption comes a

5 Things to Look Out for with AI Code Review

5 Things to Look Out for with AI Code Review

Imagine slashing the time spent on code reviews while catching more bugs and vulnerabilities than ever before. That’s the promise of AI-driven code review tools.  With

6 Threat Modeling Examples for DevSecOps

6 Threat Modeling Examples for DevSecOps

As organizations push the boundaries of innovation, the need to embed security into every layer of the development process has never been more pressing. DevSecOps—a practice

Static Code Analysis for Python: 7 features to look out for

Static Code Analysis for Python: 7 features to look out for

Python dominates the coding world, powering everything from web apps to AI breakthroughs.  It’s so popular that 70% of developers have Python in their toolkit. It’s

Top 10 data governance tools for 2024

Top 10 data governance tools for 2024

While artificial intelligence and big data steal the spotlight, a less glamorous but equally crucial discipline is quietly shaping the future of business: data governance. With

Software supply chain risk assessment: 8 steps to a secure SDLC

Software supply chain risk assessment: 8 steps to a secure SDLC

Like any chain, a software supply chain contains many links. These links consist of every actor involved in the development & deployment of your code in

SAST vs DAST: Which one do you really need?

SAST vs DAST: Which one do you really need?

Security testing? Ain’t nobody got time for that. Or budget. Or the necessary skills to align coding practices with organizational and regulatory compliance efforts. Developers are

Stop leaks at the source!