Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2021

The Top 3 Reasons to Remove Bloated Code

Many things can slow down the development and deployment of a project. But one of the most significant issues is also wholly manageable: Code Bloat. Bloated code occurs where the runtime environment contains useless pieces of code, like libraries or service binaries, that will invariably lead to software inefficiencies and security vulnerabilities.

Focus Your Efforts: Vulnerability Validation and the Colonial Pipeline Breach

The power of two CVEs Most people take it as a given that the gas station down the street will be open and have plenty of gas available, even if the price is higher than they’d like. That assumption was shattered in early May because of two unpatched vulnerabilities in Colonial Pipeline’s network. The attack that crippled the gas supply for the entire east coast didn’t require explosions or forces of nature.