{"id":71,"date":"2022-02-08T18:37:23","date_gmt":"2022-02-08T18:37:23","guid":{"rendered":"https:\/\/codase.com\/?page_id=71"},"modified":"2022-02-08T18:39:46","modified_gmt":"2022-02-08T18:39:46","slug":"blog","status":"publish","type":"page","link":"https:\/\/codase.com\/blog\/","title":{"rendered":"Blog"},"content":{"rendered":"\n<div class=\"wp-block-columns is-style-default is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-92 post type-post status-publish format-standard has-post-thumbnail hentry category-network-security entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/codase.com\/network-segmentation-the-secret-weapon-for-small-business-security\/\" target=\"_self\">Network Segmentation: The Secret Weapon for Small Business Security<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/codase.com\/network-segmentation-the-secret-weapon-for-small-business-security\/\" target=\"_self\"><img loading=\"lazy\" decoding=\"async\" width=\"1568\" height=\"1047\" src=\"https:\/\/codase.com\/wp-content\/uploads\/2023\/04\/pexels-cottonbro-studio-4065133-1568x1047.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Network Segmentation: The Secret Weapon for Small Business Security\" style=\"width:100%;height:66.8%;max-width:2560px;object-fit:cover;\" srcset=\"https:\/\/codase.com\/wp-content\/uploads\/2023\/04\/pexels-cottonbro-studio-4065133-1568x1047.jpg 1568w, https:\/\/codase.com\/wp-content\/uploads\/2023\/04\/pexels-cottonbro-studio-4065133-300x200.jpg 300w, https:\/\/codase.com\/wp-content\/uploads\/2023\/04\/pexels-cottonbro-studio-4065133-1024x684.jpg 1024w, https:\/\/codase.com\/wp-content\/uploads\/2023\/04\/pexels-cottonbro-studio-4065133-768x513.jpg 768w, https:\/\/codase.com\/wp-content\/uploads\/2023\/04\/pexels-cottonbro-studio-4065133-1536x1026.jpg 1536w, https:\/\/codase.com\/wp-content\/uploads\/2023\/04\/pexels-cottonbro-studio-4065133-2048x1368.jpg 2048w\" sizes=\"auto, (max-width: 1568px) 100vw, 1568px\" title=\"\"><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Discover how network segmentation can be the game changer for small business security. Learn how to implement it effectively in this must-read post! <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-16T21:20:46+00:00\">April 16, 2023<\/time><\/div>\n<\/li><li class=\"wp-block-post post-97 post type-post status-publish format-standard has-post-thumbnail hentry category-cloud-security category-network-security entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/codase.com\/detecting-security-vulnerabilities-in-static-code\/\" target=\"_self\">Detecting Security Vulnerabilities in Static code with Static Application Security Testing (SAST)<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/codase.com\/detecting-security-vulnerabilities-in-static-code\/\" target=\"_self\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"427\" src=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/02\/software-developer-g3da1644e3_640.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Detecting Security Vulnerabilities in Static code with Static Application Security Testing (SAST)\" style=\"width:100%;height:66.72%;max-width:640px;object-fit:cover;\" srcset=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/02\/software-developer-g3da1644e3_640.jpg 640w, https:\/\/codase.com\/wp-content\/uploads\/2022\/02\/software-developer-g3da1644e3_640-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" title=\"\"><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Introduction What is Static Application Security Testing (SAST)?&nbsp; Static application testing is a concept that most software developers who have worked with any IDE are familiar with. It is what gives an alert when you try to use an undefined variable, the wrong variable type, unreachable methods, among others. Static Application Security Testing (SAST) is&hellip;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2023-04-16T21:09:22+00:00\">April 16, 2023<\/time><\/div>\n<\/li><li class=\"wp-block-post post-88 post type-post status-publish format-standard has-post-thumbnail hentry category-cloud-security category-network-security entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/codase.com\/what-is-static-code-analysis\/\" target=\"_self\">What is Static Code Analysis<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/codase.com\/what-is-static-code-analysis\/\" target=\"_self\"><img loading=\"lazy\" decoding=\"async\" width=\"1568\" height=\"608\" src=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/97a3cfe4-875b-4df6-abc3-8e8b1d4237c6-1568x608.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"What is Static Code Analysis\" style=\"width:100%;height:38.75%;max-width:1786px;object-fit:cover;\" srcset=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/97a3cfe4-875b-4df6-abc3-8e8b1d4237c6-1568x608.png 1568w, https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/97a3cfe4-875b-4df6-abc3-8e8b1d4237c6-300x116.png 300w, https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/97a3cfe4-875b-4df6-abc3-8e8b1d4237c6-1024x397.png 1024w, https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/97a3cfe4-875b-4df6-abc3-8e8b1d4237c6-768x298.png 768w, https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/97a3cfe4-875b-4df6-abc3-8e8b1d4237c6-1536x595.png 1536w, https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/97a3cfe4-875b-4df6-abc3-8e8b1d4237c6.png 1786w\" sizes=\"auto, (max-width: 1568px) 100vw, 1568px\" title=\"\"><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Static Code Analysis Static code analysis or Source code analysis is the method of debugging a program without running the code. Static analysis helps the programmers align with the standard code guidelines. It also helps in building an understanding of the code structure. Static analysis tools are a life saver for programmers who have to&hellip;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-07-27T15:45:28+00:00\">July 27, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-84 post type-post status-publish format-standard has-post-thumbnail hentry category-cloud-security category-network-security entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/codase.com\/what-is-zero-day-vulnerability\/\" target=\"_self\">Zero-day vulnerability \u2013 How to Detect and Prevent Unknown Attacks<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/codase.com\/what-is-zero-day-vulnerability\/\" target=\"_self\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/8930eabb-87f5-40d1-bda3-750a300f4b54.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Zero-day vulnerability \u2013 How to Detect and Prevent Unknown Attacks\" style=\"width:100%;height:66.7%;max-width:1000px;object-fit:cover;\" srcset=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/8930eabb-87f5-40d1-bda3-750a300f4b54.png 1000w, https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/8930eabb-87f5-40d1-bda3-750a300f4b54-300x200.png 300w, https:\/\/codase.com\/wp-content\/uploads\/2022\/07\/8930eabb-87f5-40d1-bda3-750a300f4b54-768x512.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" title=\"\"><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">What is a zero-day vulnerability? A zero-day vulnerability is a term to describe a security flaw in the software\/system that is unknown to the vendor or developer. Only when the hacker has taken advantage of the vulnerability and attacked the system does the developer get to know of the zero-day attack. But, when that happens,&hellip;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-07-27T15:40:00+00:00\">July 27, 2022<\/time><\/div>\n<\/li><li class=\"wp-block-post post-65 post type-post status-publish format-standard has-post-thumbnail hentry category-cloud-security category-network-security entry\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/codase.com\/sast-tools-everything-you-need-to-know\/\" target=\"_self\">SAST Tools: Everything You Need to Know<\/a><\/h2>\n\n<figure class=\"alignwide wp-block-post-featured-image\"><a href=\"https:\/\/codase.com\/sast-tools-everything-you-need-to-know\/\" target=\"_self\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" src=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/02\/programming-gf62f7c921_640.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"SAST Tools: Everything You Need to Know\" style=\"width:100%;height:66.56%;max-width:640px;object-fit:cover;\" srcset=\"https:\/\/codase.com\/wp-content\/uploads\/2022\/02\/programming-gf62f7c921_640.jpg 640w, https:\/\/codase.com\/wp-content\/uploads\/2022\/02\/programming-gf62f7c921_640-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" title=\"\"><\/a><\/figure>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">What is SAST? Static Application Security Testing or SAST is an Application Security Tool that is frequently used to scan an application\u2019s binary, source, or byte code during the development cycle or code reviews. A white-box testing tool can identify the root cause of vulnerabilities and help in remedying the underlying security defects. Many SAST&hellip;&hellip; <\/p><\/div>\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2022-02-08T18:25:57+00:00\">February 8, 2022<\/time><\/div>\n<\/li><\/ul><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-71","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/pages\/71","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":2,"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/pages\/71\/revisions"}],"predecessor-version":[{"id":74,"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/pages\/71\/revisions\/74"}],"wp:attachment":[{"href":"https:\/\/codase.com\/wp-json\/wp\/v2\/media?parent=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}