Scantist Blogs
![](https://cdn.prod.website-files.com/651434d7acfa4f811d34d934/6691167953058ed6421e2ad0_file.png)
How can we effectively detect and address known vulnerabilities in existing C/C++ code bases to enhance software security and reliability?
Effectively detect and address known vulnerabilities in existing C/C++ code bases to enhance software security and reliability
![](https://cdn.prod.website-files.com/651434d7acfa4f811d34d934/668f97850ae8c859ebf2003d_third-article.png)
The AI Security Imperative: Safeguarding the Future of Innovation
Discover how Scantist AI and NTU are advancing AI security to protect valuable data and tackle unique challenges, ensuring a secure future for AI systems.
![](https://cdn.prod.website-files.com/651434d7acfa4f811d34d934/668cd2f7083a41f88098dfde_devsecops-agent.png)
The DevSecOps Revolution: Empowering SMEs in the AI Age
At Scantist, we're revolutionizing cybersecurity for SMEs with DevSecOpsAgent, our AI-powered solution that democratizes DevSecOps practices.
Case Study
![](https://cdn.prod.website-files.com/651434d7acfa4f811d34d934/651434d7acfa4f811d34dca6_f6855086-20be-4208-84fc-a9c3b9e13d7a_deputy.jpeg)
Evaluating the health of the development lifecycle
Find out how Thompson (Scantist's Software Composition Analysis tool) helped Deputy analysed the health of their development environment and track the dependency of components within their infrastructure while preventing the invalidity of their applications with the presence of legacy systems.
![](https://cdn.prod.website-files.com/651434d7acfa4f811d34d934/651434d7acfa4f811d34dca1_55c01ca8-da32-4afe-a1d5-ca275135e5e6_char.jpeg)
Application Evaluation for Investment Decision
A merchant banking firm was looking to invest in a start-up HR tech company. Prior to making a decision, it is critical to understand and evaluate the proposition of the tech company and verify the integrity of codes used in its applications and systems.
![](https://cdn.prod.website-files.com/651434d7acfa4f811d34d934/651434d7acfa4f811d34dca0_4a92a9d8-0fef-476f-81a6-f402650a4d03_big%2Btelco%2Bcase%2Bstudy.jpeg)
Fuzzing for server-like programs
Find out how Hollerith (Scantist's Smart Fuzzer) helped our client, Big Telco, disclosed exploitable vulnerabilities despite its server-like programs which rendered existing fuzzing solutions infeasible.