Day 5 – Assignment 3 – by Gorsa Lakshmi Niharika
Advantages of Fortify SCA Choosing to run SCA as a standalone process or integrating fortify SCA as part of the build tool It uses a multiple algorithms and an expansive knowledge base of security coding rules It secure by coding rules to analyze an application’s source code for exploitable vulnerabilities It technique analyzes every feasible path that execution The data can follow to identify and remediate vulnerabilities
Read more