Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Cycode: Ensuring AppSec Is a Team Sport, Not a Finger-Pointing Game

Truth in IT
05/05/2025
56
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett Small World Big Data. We are here at RSAC 2025 talking to all the latest and greatest cybersecurity vendors we have Cycode here today. I've got Amir. Welcome to did I get that right? Yep. You got it right. Nice to meet you, Mike. And thanks for having us today. Yeah. So let's let's just get right into it. Um, there are definitely lots of places that security breaches happen. Security vulnerabilities happen. You guys focus on, uh, something you're calling ACM. Could you maybe just explain that a little bit to the audience? Yeah, absolutely. So Cycode actually is a what we call ourselves is a complete ACM. So not all apms are created equal. So and the reason why we call ourselves a complete aspm is because not only do we ingest third party scanners, but we also have our own proprietary enterprise grade scanners as well. So for those that don't know what ACM stands for, it's application security, posture management. And ultimately what the crux of that is, is we help customers gain visibility, prioritization and remediation, but also help them fix what actually matters in in code and beyond code as well. So I've talked to a few people here that think about this, like posture management is one side of the house. And then there's this remediation as the other side house. Are you are you saying you kind of help close that loop and that cycle and bring it together? Yeah, absolutely. I think one of our philosophies with Appsec is making sure that application security is more of a team sport, and what we're trying to essentially do is bring appsec and security teams and the developers a lot closer together. So what that means is giving Appsec teams all the visibility to do what they want, you know, give them visibility into all the blind spots, and then the developer teams more of that self-serve way to remediate the things that actually matter to them. Once you do that, you start to build more of that circle of trust. So now you can build at a much higher developer velocity. You're decreasing the amount of false positives and the vulnerabilities and so on. So that's a big part of our philosophy here at Cycode. So you talked about having your homemade I shouldn't say homemade, your purpose built custom built scanners. Right. Not to disparage proprietary scanners. Could you just walk us through what a scanner might actually do with a code base? Yeah, there's different types of scanners. We do coverage across from code to cloud. So one of them being secrets in code and beyond code as well. So looking at your passwords, your API tokens and secrets and so on, not only within code but also across your developer tools or even productivity tools like slack, confluence, Jira, and so on. The other is SaaS and SCA. So Sast is for the audience's static application security testing. And then SCA is software composition analysis. So looking at both your own proprietary code but also open source code as well. All right. So so you're going to help people also look a little bit at that supply chain problem we mentioned before in terms of software supply chain on there. Yeah absolutely. I think one of the unique things about CI code as well, and our complete APM is we're one of the first to market to bring the convergence of application security, aspm and software supply chain together into one platform in itself. And this is what's helping application security leaders, product security leaders and developers really come together. All right. That's pretty cool. So we're here at RSAC. If you looked around the show floor here, is there something that you would want to tell everybody as a key takeaway, you know, relevant to what you guys are doing that they should probably keep in mind as they go home? Yeah, absolutely. As everybody knows, we're in the era. And I think now is the time where we're seeing two major shifts happening, especially with this whole Ten-x developer output. Right? One shift is around, you know, this whole resource capacity shift, where in the past you had a ratio of one appsec engineer to 100 developers, and I think that increases by an order of magnitude by ten x now. So effectively you're at like one appsec engineer for every 1000 developers, even though you might not have those 1000 developers. So that's one aspect. The other aspect is a risk element to it as well. So now you're exceeding the capacity for risk in in comparison to the amount that you can actually remediate as well. So it's just such an unmanageable attack surface at this point with all the AI happening. All right. This is pretty interesting. And there's probably a lot more to talk about. There's lots of pretty visualizations and ways you help people prioritize and look at those reports. But if someone wants to like, learn a little bit more about what you guys do, dig a little deeper. Uh, probably have a website like everyone else, but is there something for the RSA crowd you would point them to specifically? Yeah, absolutely. I would say just visit our website on cycode.com. Uh, and if you'd like to speak to one of our engineers on staff, definitely book a demo with us and we're happy to walk you through the platform. Thank you so much, Amir, I appreciate it. Thank you so much. Thanks for having. Us. All right. Take care, folks. Check it out.
Cycode positions itself as a full-spectrum ASPM solution with proprietary and third-party scanners that address everything from hardcoded secrets to open-source vulnerabilities. By enabling collaboration between AppSec and dev teams, Cycode helps enterprises scale secure development, close the remediation loop, and tame sprawling software supply chains.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • cycode
  • aspm
  • appsec
  • devsecops
  • software
  • supply
  • chain
  • code
  • scanning
  • open
  • source
  • security
  • vulnerability
  • remediation
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cycode: Ensuring AppSec Is a Team Sport, Not a Finger-Pointing Game

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection Strategies for Enhanced Threat Prevention 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-strategies-for-enhanced-threat-prevention-8-0/
              • 01/28/2026
                10:00 AM
                01/28/2026
                Strategies for Safeguarding Data in the AI Era through DSPM
                https://www.truthinit.com/index.php/channel/1797/strategies-for-safeguarding-data-in-the-ai-era-through-dspm/
              • 01/28/2026
                10:55 AM
                01/28/2026
                Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization
                https://www.truthinit.com/index.php/channel/1769/transforming-insights-into-action-a-comprehensive-security-strategy-for-scalable-data-democratization/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 01/29/2026
                12:00 PM
                01/29/2026
                Transforming Secure Access through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1772/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/03/2026
                04:00 AM
                02/03/2026
                De la visibilidad a la protección: seguridad integral para datos sensibles
                https://www.truthinit.com/index.php/channel/1792/de-la-visibilidad-a-la-protección-seguridad-integral-para-datos-sensibles/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/19/2026
                03:00 AM
                02/19/2026
                DACH Partner Insights - Breakfast Webinar on Keepit Solutions
                https://www.truthinit.com/index.php/channel/1786/dach-partner-insights-breakfast-webinar-on-keepit-solutions/

              Upcoming Spotlight Events

              • Jan
                20

                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                01/20/202601:00 PM ET
                • Jan
                  22

                  Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                  01/22/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection Strategies for Enhanced Threat Prevention 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      28

                      Strategies for Safeguarding Data in the AI Era through DSPM

                      01/28/202610:00 AM ET
                      • Jan
                        28

                        Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization

                        01/28/202610:55 AM ET
                        More events

                        Recent Spotlight Events

                        • Dec
                          10

                          The Next Generation of Managed Data Security Services

                          12/10/202501:00 PM ET
                          • Dec
                            02

                            The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                            12/02/202501:00 PM ET
                            • Nov
                              20

                              Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                              11/20/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                18

                                Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                                12/18/202501:00 PM ET
                                • Dec
                                  16

                                  HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                  12/16/202501:00 PM ET
                                  • Dec
                                    11

                                    Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                    12/11/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version