As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems?
Different types of software licenses require you to meet certain obligations if you want to reuse the code. Here are 5 common types of software licenses.
Learn why application security vulnerabilities are a serious consideration in tech due diligence and how to evaluate your security risk in M&A transactions.
Ghostcat (CVE-2020-1938) is an Apache Tomcat vulnerability that allows remote code execution in some circumstances. Here’s how to find and mitigate it.
Learn how to broaden your knowledge, hone your software development skills, decide on a specialization—and stand out in an increasingly competitive field.
Want DevSecOps? Here are some tips to get your development, security, and operations teams communicating effectively and working toward a single purpose.
Learn about management practices inspired by open source principles, such as allowing the best ideas to guide the team, no matter who brings them up.
Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time.
SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.
Are you releasing software with legacy vulnerabilities that you put aside to address later but forgot about—or that you didn’t even know were in your code?