Software Integrity Blog

3 ways to improve your software development skills

Learn how to broaden your knowledge, hone your software development skills, decide on a specialization—and stand out in an increasingly competitive field.

Continue Reading...

DevSecOps success takes people, not just technology

Want DevSecOps? Here are some tips to get your development, security, and operations teams communicating effectively and working toward a single purpose.

Continue Reading...

[Webinar] How Open Source Made Me a Better Manager

Learn about management practices inspired by open source principles, such as allowing the best ideas to guide the team, no matter who brings them up.

Continue Reading...

Tips for working from home without losing your marbles or compromising security

Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time.

Continue Reading...

Uncover SweynTooth vulnerabilities with Defensics fuzz testing

SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.

Continue Reading...

How to deal with legacy vulnerabilities

Are you releasing software with legacy vulnerabilities that you put aside to address later but forgot about—or that you didn’t even know were in your code?

Continue Reading...

Open source software use grows in Germany, but compliance and risk management need improvement

A new report from Bitkom reveals that among companies that use open source, many aren’t sure of the best way to approach open source risk management.

Continue Reading...

SAST and SCA: Why use both?

If you use an SCA tool, why should you use a SAST tool as well? Let’s discuss what each tool can and can’t do and how they complement each other.

Continue Reading...

What is security debt, and how do I get out of it?

Security debt refers to the accumulation of vulnerabilities in your software that make it harder to protect your data and systems. How do you get rid of it?

Continue Reading...

[Webinars] SAST and SCA together, managed pen testing for risk management

Learn how to combine SAST and SCA to find and fix more security and quality issues, and how managed pen testing supports your risk management strategy.

Continue Reading...