Software Integrity Blog

Search Results for 'hacking security'

 

Hacking Security Episode 4: DevSecOps with Meera Rao

Hacking Security is a monthly podcast on emerging trends in application security. In Episode 4, secure development expert Meera Rao discusses DevSecOps.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Developer Enablement

 

Hacking Security Episode 3: OSSRA report findings

Hacking Security is a monthly podcast on emerging trends in application security. Episode 3 explores key findings from the 2018 OSSRA report.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Software Composition Analysis

 

Hacking Security Episode 2: The 4 CISO tribes

Hacking Security is a monthly podcast on emerging trends in application security. Episode 2 explores the four tribes described in the CISO Report. Listen now.

Continue Reading...

Posted in General

 

Hacking Security Episode 1: What is Hacking Security?

Hacking Security is a monthly podcast on emerging trends in application security. Episode 1 covers how we came up with the name “Hacking Security.”

Continue Reading...

Posted in General

 

It’s not just autonomous cars of the future that need security

The future of secure autonomous vehicles starts today. But the auto industry has to overcome some challenges, like shifting left and building security in.

Continue Reading...

Posted in Automotive Security

 

Feds seek to up their cybersecurity game

Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?

Continue Reading...

Posted in Internet of Things

 

Bug bounties: A good tool, but don’t make them the only tool in security

Bug bounty programs are becoming more popular. Do they work? What are the pitfalls of crowdsourcing application security testing? Our experts weigh in.

Continue Reading...

Posted in Web Application Security

 

The IoT: Still feature rich, security poor

How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?

Continue Reading...

Posted in Internet of Things

 

Santa gets phished: A tale of holiday hacking

When the elves at Santa’s Workshop receive a complaint that children are receiving Bitcoin ransom emails from Santa, they discover that they’ve been hacked.

Continue Reading...

Posted in General

 

President’s ‘cybersecurity moonshot’: Transformational or pie in the sky?

Making the internet safe and secure in 10 years isn’t going to be easy, if it’s even possible. And that’s why NSTAC’s new proposal is a cyber security moonshot.

Continue Reading...

Posted in General