Software Integrity Blog

Author Archive

Derek Handova

handova

Derek Handova is an enthusiastic white paper writer and content marketer in the B2B and technology spaces. Previously, he has led content creation efforts at prominent companies such as Altera, BearingPoint, Inc., Check Point Software, Harris Corporation, Solectron Corporation, and other Silicon Valley icons.


Posts by Derek Handova:

 

How DevOps security tools support modern applications

Modern application development organizations must integrate and automate DevOps security tools such as IAST into CI/CD pipelines to speed developers.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Interactive Application Security Testing (IAST) | Comments Off on How DevOps security tools support modern applications

 

What are the different types of security vulnerabilities?

An application security vulnerability is a security bug, flaw, error, fault, hole, or weakness in software architecture, design, code, or implementation that can be exploited by attackers. Let’s take a closer look at the different types of security vulnerabilities.

Continue Reading...

Posted in Web Application Security | Comments Off on What are the different types of security vulnerabilities?

 

Top 3 cloud security trends for 2019

A new report covers the top cloud security trends for 2019, including cloud security concerns, cloud compliance challenges, and barriers to cloud adoption.

Continue Reading...

Posted in Cloud Security | Comments Off on Top 3 cloud security trends for 2019

 

What happens when your CISO has one of those days?

A CISO having a bad day finds out the hard way that cutting corners on software security testing might end up costing him more than he saved.

Continue Reading...

Posted in Mobile App Security, Web Application Security | Comments Off on What happens when your CISO has one of those days?

 

Technology company M&A: Do due diligence on SDLC process/tools

Technical due diligence on the target’s SDLC is a must for acquirers in software M&A. What you don’t know about their process and tools could hurt you.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Software Composition Analysis (SCA) | Comments Off on Technology company M&A: Do due diligence on SDLC process/tools

 

[Infographic] A look back at the first year of GDPR

The first year of GDPR started slow, but companies and regulators alike are picking up speed. Our new infographic shows GDPR’s first year by the numbers.

Continue Reading...

Posted in Software Compliance, Quality & Standards | Comments Off on [Infographic] A look back at the first year of GDPR

 

New Synopsys Polaris platform optimized for Red Hat OpenShift Container Platform

Open source is eating software, but Red Hat and Synopsys help you build and deploy containers more securely and at scale.

Continue Reading...

Posted in Container Security, Open Source Security | Comments Off on New Synopsys Polaris platform optimized for Red Hat OpenShift Container Platform