Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Cycode: Ensuring AppSec Is a Team Sport, Not a Finger-Pointing Game

Truth in IT
05/05/2025
56
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data. We are here at RSAC 2025 talking to all the latest and greatest cybersecurity vendors we have Cycode here today. I've got Amir. Welcome to did I get that right? Yep. You got it right. Nice to meet you, Mike. And thanks for having us today. Yeah. So let's let's just get right into it. Um, there are definitely lots of places that security breaches happen. Security vulnerabilities happen. You guys focus on, uh, something you're calling ACM. Could you maybe just explain that a little bit to the audience? Yeah, absolutely. So Cycode actually is a what we call ourselves is a complete ACM. So not all apms are created equal. So and the reason why we call ourselves a complete aspm is because not only do we ingest third party scanners, but we also have our own proprietary enterprise grade scanners as well. So for those that don't know what ACM stands for, it's application security, posture management. And ultimately what the crux of that is, is we help customers gain visibility, prioritization and remediation, but also help them fix what actually matters in in code and beyond code as well. So I've talked to a few people here that think about this, like posture management is one side of the house. And then there's this remediation as the other side house. Are you are you saying you kind of help close that loop and that cycle and bring it together? Yeah, absolutely. I think one of our philosophies with Appsec is making sure that application security is more of a team sport, and what we're trying to essentially do is bring appsec and security teams and the developers a lot closer together. So what that means is giving Appsec teams all the visibility to do what they want, you know, give them visibility into all the blind spots, and then the developer teams more of that self-serve way to remediate the things that actually matter to them. Once you do that, you start to build more of that circle of trust. So now you can build at a much higher developer velocity. You're decreasing the amount of false positives and the vulnerabilities and so on. So that's a big part of our philosophy here at Cycode. So you talked about having your homemade I shouldn't say homemade, your purpose built custom built scanners. Right. Not to disparage proprietary scanners. Could you just walk us through what a scanner might actually do with a code base? Yeah, there's different types of scanners. We do coverage across from code to cloud. So one of them being secrets in code and beyond code as well. So looking at your passwords, your API tokens and secrets and so on, not only within code but also across your developer tools or even productivity tools like slack, confluence, Jira, and so on. The other is SaaS and SCA. So Sast is for the audience's static application security testing. And then SCA is software composition analysis. So looking at both your own proprietary code but also open source code as well. All right. So so you're going to help people also look a little bit at that supply chain problem we mentioned before in terms of software supply chain on there. Yeah absolutely. I think one of the unique things about CI code as well, and our complete APM is we're one of the first to market to bring the convergence of application security, aspm and software supply chain together into one platform in itself. And this is what's helping application security leaders, product security leaders and developers really come together. All right. That's pretty cool. So we're here at RSAC. If you looked around the show floor here, is there something that you would want to tell everybody as a key takeaway, you know, relevant to what you guys are doing that they should probably keep in mind as they go home? Yeah, absolutely. As everybody knows, we're in the era. And I think now is the time where we're seeing two major shifts happening, especially with this whole Ten-x developer output. Right? One shift is around, you know, this whole resource capacity shift, where in the past you had a ratio of one appsec engineer to 100 developers, and I think that increases by an order of magnitude by ten x now. So effectively you're at like one appsec engineer for every 1000 developers, even though you might not have those 1000 developers. So that's one aspect. The other aspect is a risk element to it as well. So now you're exceeding the capacity for risk in in comparison to the amount that you can actually remediate as well. So it's just such an unmanageable attack surface at this point with all the AI happening. All right. This is pretty interesting. And there's probably a lot more to talk about. There's lots of pretty visualizations and ways you help people prioritize and look at those reports. But if someone wants to like, learn a little bit more about what you guys do, dig a little deeper. Uh, probably have a website like everyone else, but is there something for the RSA crowd you would point them to specifically? Yeah, absolutely. I would say just visit our website on cycode.com. Uh, and if you'd like to speak to one of our engineers on staff, definitely book a demo with us and we're happy to walk you through the platform. Thank you so much, Amir, I appreciate it. Thank you so much. Thanks for having. Us. All right. Take care, folks. Check it out.
Cycode positions itself as a full-spectrum ASPM solution with proprietary and third-party scanners that address everything from hardcoded secrets to open-source vulnerabilities. By enabling collaboration between AppSec and dev teams, Cycode helps enterprises scale secure development, close the remediation loop, and tame sprawling software supply chains.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • cycode
  • aspm
  • appsec
  • devsecops
  • software
  • supply
  • chain
  • code
  • scanning
  • open
  • source
  • security
  • vulnerability
  • remediation
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cycode: Ensuring AppSec Is a Team Sport, Not a Finger-Pointing Game

              Upcoming Webinar Calendar

              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-cultivating-trust-amidst-the-rise-of-agentic-commerce/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/02/2025
                01:00 PM
                12/02/2025
                The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security
                https://www.truthinit.com/index.php/channel/1629/the-invisible-threat-how-polymorphic-malware-is-outsmarting-your-email-security/
              • 12/02/2025
                01:00 PM
                12/02/2025
                Begin Your Journey with Netwrix for Effective Data Management
                https://www.truthinit.com/index.php/channel/1631/begin-your-journey-with-netwrix-for-effective-data-management/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                01:00 PM
                12/10/2025
                HUMAN Dialogue: Uncovering True Insights to Safeguard Performance through Page-Level Intelligence
                https://www.truthinit.com/index.php/channel/1630/human-dialogue-uncovering-true-insights-to-safeguard-performance-through-page-level-intelligence/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Maximize Revenue Opportunities with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/maximize-revenue-opportunities-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize Revenue Potential: Address Gaps with Druva’s Microsoft Expansion
                https://www.truthinit.com/index.php/channel/1625/maximize-revenue-potential-address-gaps-with-druvas-microsoft-expansion/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Enhance Revenue Streams: Address Gaps with Druva's Microsoft Expansion Solutions.
                https://www.truthinit.com/index.php/channel/1623/enhance-revenue-streams-address-gaps-with-druvas-microsoft-expansion-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Nov
                18

                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                11/18/202501:00 PM ET
                • Nov
                  20

                  Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                  11/20/202501:00 PM ET
                  • Dec
                    02

                    The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                    12/02/202501:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Nov
                      18

                      HUMAN Dialogue: Cultivating Trust Amidst the Rise of Agentic Commerce

                      11/18/202501:00 PM ET
                      • Nov
                        20

                        Trend Micro Webinar: Smarter Decision Making via Network Intelligence

                        11/20/202511:00 AM ET
                        • Nov
                          20

                          CMMC Certification: Next Steps for Continuous Monitoring and Management

                          11/20/202512:00 PM ET
                          More events

                          Upcoming 360 View Events

                          • Dec
                            18

                            360View: 2026 IT Predictions & Emerging Trends

                            12/18/202512:00 PM ET
                            More events

                            Recent Spotlight Events

                            • Oct
                              22

                              Cut Ticket Resolution Time in Half with Smarter IT Documentation

                              10/22/202501:00 PM ET
                              • Oct
                                15

                                Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                10/15/202501:00 PM ET
                                • Sep
                                  16

                                  KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                  09/16/202501:00 PM ET
                                  More events

                                  Recent Industry Events

                                  • Nov
                                    13

                                    Transforming AI Trends into Tangible Business Success with Druva

                                    11/13/202501:00 PM ET
                                    • Nov
                                      13

                                      Advancements in Click Fraud Prevention: Insights from LinkedIn and HUMAN

                                      11/13/202501:00 PM ET
                                      • Nov
                                        13

                                        Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls

                                        11/13/202512:30 PM ET
                                        More events
                                        Truth in IT
                                        • Sponsor
                                        • About Us
                                        • Terms of Service
                                        • Privacy Policy
                                        • Contact Us
                                        • Preference Management
                                        Desktop version
                                        Standard version