Software Integrity Blog

Author Archive

Jamie Boote

jamieboote

Jamie Boote is a security consultant at Synopsys. He works with organizations to ensure their developers understand how to write secure code. Jamie believes that software security doesn't happen in isolation and needs effective communication between all levels of a company. When he's not advocating for the dinosaurs in any Perl vs. Python argument, Jamie can be found chasing his sons around Southern Florida.


Posts by Jamie Boote:

 

How to build a process around an application security tool

How do you ensure your application security tools are enablers rather than hurdles? By building application security processes around the tools you deploy.

Continue Reading...

Posted in Software Security Program | Comments Off on How to build a process around an application security tool

 

How proactive is your software security initiative?

A proactive software security initiative protects your organization. Does your software security measure up? Take our 12-question quiz to find out.

Continue Reading...

Posted in Software Security Program | Comments Off on How proactive is your software security initiative?

 

Software security program checklist: Kick off your program with a bang

If you want to enjoy your Sunday kickoffs, our software security program checklist of five activities will help you kick off your program successfully.

Continue Reading...

Posted in Software Security Program | Comments Off on Software security program checklist: Kick off your program with a bang

 

4 simple steps to encourage online safety at your company

Raise security awareness in your organization. You’ll protect your employees and your business. Get started with these online safety tips.

Continue Reading...

Posted in Security Training & Awareness | Comments Off on 4 simple steps to encourage online safety at your company

 

Why should every eCommerce website have an SSL certificate?

In the world of data security, a critical element of working with users is earning their trust. Obtaining, implementing, and properly using an SSL certificate is one way to protect user data. Without a certificate, there is also no easy way to keep the communications between the user and an eCommerce website private from attackers. What is encryption? Encryption protects data and keeps secrets out of reach from eavesdroppers. It seems like the stuff of movies and television dramas. It’s often portrayed in the media as some impenetrable obstacle that can’t be overcome without keys. Or, as an easy challenge to solve with rapid typing and a few progress bars.

Continue Reading...

Posted in Software Architecture & Design, Web Application Security | Comments Off on Why should every eCommerce website have an SSL certificate?

 

How to prevent SQL injection attacks: A cheat sheet

Our SQL injection cheat sheet shows you how to prevent attacks by using database features to separate commands from data and writing secure code.

Continue Reading...

Posted in Software Architecture & Design | Comments Off on How to prevent SQL injection attacks: A cheat sheet

 

Getting to the bottom of the top 5 vendor risk management best practices

“We cannot enter into alliances until we are acquainted with the designs of our neighbors.”

Continue Reading...

Posted in Application Security | Comments Off on Getting to the bottom of the top 5 vendor risk management best practices

 

How to choose between closed source and open source software

“I suppose it is tempting, if the only tool you have is a hammer, to treat everything as if it were a nail.”

Continue Reading...

Posted in Static Analysis (SAST) | Comments Off on How to choose between closed source and open source software

 

5 questions to ask yourself when deciding on the best static code analysis tool

A security toolbox has a variety of static code analysis tools that may all look alike at first glance but actually serve different purposes.

Continue Reading...

Posted in Static Analysis (SAST) | Comments Off on 5 questions to ask yourself when deciding on the best static code analysis tool

 

Are you making software security a requirement?

Robust software security requirements help you lock down what your software does so that it can be used only as intended. Learn how to build your own.

Continue Reading...

Posted in Application Security | Comments Off on Are you making software security a requirement?