Software Integrity Blog

Analysis of an attack on automotive keyless entry systems

The convenience of keyless entry systems can come at a price: your security. Learn how key fob hacks happen and why proactive security measures are a vital part of stopping them.

Continue Reading...

How to cyber security: Containerizing fuzzing targets

Achieve repeatable, consistent testing results in a controlled environment using containerization with fuzz testing.

Continue Reading...

Don’t let AppSec tool overload slow down your development

Application security testing tools help developers understand security concerns, but having too many tools can do more harm than good.

Continue Reading...

Eight must-have features in an IAST solution

Selecting the perfect IAST solution for your organization’s needs can be difficult. Learn about the eight must-have features of any good IAST tool.

Continue Reading...

How to integrate automated AST tools in your CI/CD pipeline

Selecting AST tools for your CI/CD pipeline requires an understanding of where to integrate and how to configure your tools to get the most out of your investments.

Continue Reading...

AppSec Decoded: Manufacturing more-secure IoT devices

In our latest episode of AppSec Decoded, we discuss how manufacturers can secure their IoT devices.

Continue Reading...

Securing your code: GDPR best practices for application security

GDPR best practices often focus on how to process and manage personal data, but companies should also consider application security to ensure compliance.

Continue Reading...

Discovery capabilities: A core differentiator for Black Duck SCA

Stay on top of open source vulnerabilities and license obligations with discovery capabilities from Black Duck.

Continue Reading...

How to manage open source risks using Black Duck SCA

Open source risk goes beyond application security. Legal, operational, and supply chain implications demand a capable solution like Black Duck SCA.

Continue Reading...

How to cyber security: Faceplanting in 10 lines of code

Failure to address security early in the software development life cycle can increase business risks. Learn how a proactive, holistic approach helps achieve more-secure software.

Continue Reading...