Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Keywords: » code

Items Tagged with 'code'

ARTICLES

Target store

Target’s Source Code Confirmed Stolen: Why Does This Matter?

Jordyn Alger, Managing Editor, Security
Jordyn Alger
January 13, 2026

Source code theft can leave an organization more vulnerable than before. 


Read More
Colorful text code on black screen

AI Introduces Security Vulnerabilities Within Code in 45% of Cases

Security Staff
July 31, 2025

A recent report by Veracode revealed that while AI produces functional code, it introduces security vulnerabilities in 45% of cases.


Read More
Coding

The Truth Is Always in the Code: Why Security Starts With Visibility

Cohen headshot
Karen Cohen
May 20, 2025

The software security field is ever-changing, but one principle remains constant: the truth is always in the code.


Read More
Red fibers

Open source software vulnerabilities found in 86% of codebases

Jordyn Alger, Managing Editor, Security
Jordyn Alger
February 25, 2025

86% of codebases had open source software vulnerabilities while 81% had high- or critical-risk vulnerabilities.


Read More
Coding laptop and workspace

North Korean hacker group using false coding tests to spread malware

Jordyn Alger, Managing Editor, Security
Jordyn Alger
September 16, 2024

Research has identified malicious software packages associated with the North Korean hacking group, Lazarus Group. 


Read More
Two monitors and keyboard on desk

The average open source vulnerability is 2.5 years old

Security Staff
February 27, 2024

According to a report, nearly 75% of commercial codebases assessed for risk contain open source components impacted by high-risk vulnerabilities.


Read More
cyber alert
Cybersecurity Education & Training

False positives: Mitigating concerns from cybersecurity-minded users

Keavy Murphy
Keavy Murphy
January 9, 2024

As new security risks emerge daily and the tech landscape shifts, false positives are here to stay. Security teams can use data to manage cyber risk.


Read More
Artificial intelligence abstract

Will AI make organizations more secure?

Monica Oravcova
March 6, 2023

With both good and bad actors using AI, enterprises will need the best solution to defend themselves. It's an arms race as to who has the best tool.


Read More
cloud graphic with upload arrow in center

What CISOs need to know about CNAPP

Chris Simmons
March 3, 2023

Cloud native application protection platforms enable CISOs to ensure that the pace of security matches the pace of development of cloud applications.


Read More
code on blue screen

Secure code training ruled better investment than code scanning tools

Security Staff
January 30, 2023

EMA's Secure Coding Practices survey of 129 software development professionals found that code scanning tools were less effective than developers.


Read More
More Articles Tagged with 'code'
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing