A deep dive into code quality metrics, highlighting seven metrics and explaining how to monitor them and why they are important to code quality.| blog.codacy.com
Learn more about code complexity; what increases code complexity, what the main metrics are that need to be measured, and how to reduce it.| blog.codacy.com
We explain technical debt, the types of technical debt that exist, how it's accrued, and how to reduce and manage technical debt in your organization.| blog.codacy.com
We explore software composition analysis (SCA), defining what it is, why it's important, and how SCA tools can help your development team.| blog.codacy.com
We take a deep dive into why code documentation is important and offer tips on how to document your code properly with best practices and available tools.| blog.codacy.com
A complete guide to shift left testing that explains what it is, its benefits, and how your development team can implement shift left testing processes.| blog.codacy.com
We discuss what shift left security means, its benefits and challenges, and how to implement shift left security into your development process.| blog.codacy.com
We discuss how to think about integrating security into a CI/CD pipeline through automated security testing to ensure you get security and speed.| blog.codacy.com
Advancements in technology and decreased costs have made it feasible to implement a proactive approach to web application security.| blog.codacy.com
n this post, we define supply chain security and discuss some common challenges organizations face and best practices for ensuring supply chain security.| blog.codacy.com
Codacy CEO Jaime Jorge discusses why it's imperative to prioritize security in the earliest stages of the software development lifecycle.| blog.codacy.com
A complete guide to application security that explains common security threats and best practices teams can use to secure and mitigate these threats.| blog.codacy.com
Codacy CEO Jaime Jorge talks about building a culture in a software development organization that focuses on code and software quality above all else.| blog.codacy.com
Learn what pull requests are, what good and bad PRs look like, and what your team can do to optimize creating and analyzing pull requests.| blog.codacy.com
Everything you've ever wanted to know about coding standards. Understand what they are, why they are important, and how to implement them effectively.| blog.codacy.com
We take you through Codacy's definition of code quality to help you understand what high-quality code looks like, whether you use our platform or not.| blog.codacy.com
A guide to DevSecOps explaining what it is, why it is important, its connection with DevOps, and how to put it into practice in your development lifecycle.| blog.codacy.com
We created a complete guide to cloud security posture management to explain what it is, why companies need to invest in it, its benefits, and more.| blog.codacy.com
We delve into methods and best practices for implementing AST within your organization to ensure robust protection against potential threats.| blog.codacy.com
A complete guide to SAST (Static Application Security Testing), why it's important, and how to implement code security best practices.| blog.codacy.com
We discuss how compliance can be a foundation for robust security practices and how to leverage compliance requirements to bolster your security posture.| blog.codacy.com
We explain static code analysis covering static analysis basics, tools, why it's key for testing and important for modern code review.| blog.codacy.com
Explore best practices for conducting effective code reviews in order to strengthen your defenses and keep your software secure.| blog.codacy.com
We discuss the secure coding standards that, when implemented thoughtfully, offer tangible benefits that enhance the very essence of Agile development.| blog.codacy.com
Managing code reviews for large-scale projects can be challenging. Here are some best practices your team can follow to improve your code review processes.| blog.codacy.com
A complete guide to DAST (Dynamic Application Security Testing). Learn about what is it, why it is important, and how to implement it.| blog.codacy.com
We examine software development best practices for measuring, managing, and tackling technical debt, particularly in Agle.| blog.codacy.com
We explore what Common Vulnerabilities and Exposures (CVE) are, and what software development companies can do to identify and mitigate them.| blog.codacy.com
A complete guide to penetration testing that discusses what it is, why it's important, what types of pen tests exists, and how penetration testing works.| blog.codacy.com