Learn how to broaden your knowledge, hone your software development skills, decide on a specialization—and stand out in an increasingly competitive field.
Want DevSecOps? Here are some tips to get your development, security, and operations teams communicating effectively and working toward a single purpose.
Learn about management practices inspired by open source principles, such as allowing the best ideas to guide the team, no matter who brings them up.
Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time.
SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.
Are you releasing software with legacy vulnerabilities that you put aside to address later but forgot about—or that you didn’t even know were in your code?
A new report from Bitkom reveals that among companies that use open source, many aren’t sure of the best way to approach open source risk management.
If you use an SCA tool, why should you use a SAST tool as well? Let’s discuss what each tool can and can’t do and how they complement each other.
Security debt refers to the accumulation of vulnerabilities in your software that make it harder to protect your data and systems. How do you get rid of it?
Learn how to combine SAST and SCA to find and fix more security and quality issues, and how managed pen testing supports your risk management strategy.