Spectral now part of Check Point’s CloudGuard to provide the industry’s most comprehensive security platform from code to cloud Read now

Back to blog

Developer tools

10 Insider tips to set up Azure Security Groups

10 Insider tips to set up Azure Security Groups

If you use the Azure cloud, Azure security groups should be on your radar because they’re a fundamental component of securing your resources. As we move

A developer's guide to implementing Policy as Code

A developer’s guide to implementing Policy as Code

In 2022, the adoption of infrastructure as code (IaC) soared, with IaC domain specific languages like HCL, Shell and GoLang gaining popularity and momentum across the

How to Run a SAST test: The Dev Tutorial

How to Run a SAST test: The Dev Tutorial

If you prioritize long-term security and success, you should be analyzing your applications from the inside out. Enter Static Application Security Testing (SAST), a proactive method

Top 8 Software Composition Analysis (SCA) Tools for 2023

Top 8 Software Composition Analysis (SCA) Tools for 2023

The software development landscape moves quickly. As organizations seek to innovate at increasing speed, developers find ways to develop and deploy digital apps faster. More than

Jest async test: A developer's tutorial

Jest async test: A developer’s tutorial

Jest is one of the most commonly used test frameworks for JavaScript testing. With the rise of asynchronicity in modern web development, it’s important to know

7 Battle-Tested Tips for Using a DAST Scanner

7 Battle-Tested Tips for Using a DAST Scanner

While modern web applications are growing in complexity, the threat landscape is also constantly evolving. It can be difficult for developers to identify and remediate vulnerabilities

Top 9 Vendor Risk Management Software for Infosec Pros in 2023

Top 9 Vendor Risk Management Software for Infosec Pros in 2023

No single organization can master all trades, which is why their success hinges heavily on their vendors. And if vendors are crucial for your business operations,

What is OS Hardening and How Can Developers Implement it

What is OS Hardening and How Can Developers Implement it

As cyber threats become increasingly advanced and complex, organizations are forced to adopt a military attitude of ‘war footing’ to secure their systems and servers. Although

Top 5 IAST Tools

Top 5 IAST Tools for 2022

The trouble with allowing developers to deploy code directly to production is that security threats are often overlooked in the process. These vulnerabilities only show up

Stop leaks at the source!