Software Integrity Blog

Search Results for 'government security'

 

GAO report confirms major gaps in government cybersecurity

The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.

Continue Reading...

Posted in Automotive Cyber Security, IoT Security

 

Security lessons from the House Oversight and Government Reform Committee

The U.S. House Committee on Oversight and Government Reform has more than a few things to say about responsible enterprise application security.

Continue Reading...

Posted in Data Breach Security, Open Source Security

 

The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come?

Continue Reading...

Posted in Software Compliance, Quality & Standards

 

Ask the Experts: What’s the top cloud migration security risk?

We’ve gathered some expert opinions about the top cloud migration security risks that organizations should think about when moving to the cloud.

Continue Reading...

Posted in Cloud Security

 

Your application security testing tool just got acquired. Now what?

A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.

Continue Reading...

Posted in Interactive Application Security Testing (IAST)

 

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach Security, Healthcare Security & Privacy, Software Security Program

 

The cybersecurity workforce executive order: Real potential or wishful thinking?

The cybersecurity executive order of 2019 is meant to boost cyber security skills and improve national defense against growing cyber threats. Will it work?

Continue Reading...

Posted in Security Training & Awareness

 

Tips for recruiting top cyber security talent (and mistakes to avoid)

The cyber security job market is hot, and common recruiting mistakes can keep new talent away. Here are some do’s and don’ts for cyber security recruiting.

Continue Reading...

Posted in Security Training & Awareness

 

The state of cybersecurity in the physical security industry

The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems.

Continue Reading...

Posted in IoT Security

 

[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

In our software compliance webinar, Matan Scharf (Synopsys) explains the hidden security dangers of software standardization. Available on demand.

Continue Reading...

Posted in Software Compliance, Quality & Standards, Webinars