Software Integrity Blog

If you want to succeed in gaming, don’t play games with security

Video game security risks are on the rise. Building security into your software development life cycle can help protect your reputation and customers. 

Continue Reading...

How I sped up one of our test suites by 17.5x by explicitly defining Elixir protocol implementations

Fallback protocols could be causing slower tests when running with code coverage. Defining protocol implementations can improve the speed.

Continue Reading...

CyRC Vulnerability Advisory: Denial of service vulnerability in Jetty web server

CVE-2020-27223 is a denial of service vulnerability discovered in the Eclipse Foundation’s popular Jetty web server.

Continue Reading...

Take the #ChooseToChallenge pledge for International Women’s Day

In celebration of this year’s International Women’s Day, we look at ways to challenge today’s workforce to build a more gender-equal world.

Continue Reading...

AppSec Decoded: What is driving DevSecOps adoption?

In our latest episode of AppSec Decoded, we explore the main drivers of DevSecOps adoption as noted in the BSIMM11 report.

Continue Reading...

Analysis of an attack on automotive keyless entry systems

The convenience of keyless entry systems can come at a price: your security. Learn how key fob hacks happen and why proactive security measures are a vital part of stopping them.

Continue Reading...

How to cyber security: Containerizing fuzzing targets

Achieve repeatable, consistent testing results in a controlled environment using containerization with fuzz testing.

Continue Reading...

Don’t let AppSec tool overload slow down your development

Application security testing tools help developers understand security concerns, but having too many tools can do more harm than good.

Continue Reading...

How to integrate automated AST tools in your CI/CD pipeline

Selecting AST tools for your CI/CD pipeline requires an understanding of where to integrate and how to configure your tools to get the most out of your investments.

Continue Reading...

AppSec Decoded: Manufacturing more-secure IoT devices

In our latest episode of AppSec Decoded, we discuss how manufacturers can secure their IoT devices.

Continue Reading...