Software Integrity Blog

Author Archive

Jonathan Knudsen

jknudsen

Jonathan Knudsen likes to break things. He has tested all kinds of software, from network infrastructure and medical devices to cryptocurrency nodes. Jonathan has worked as a developer, consultant, and author. He has published books about 2D graphics, cryptography, and Lego robots, and has written more than one hundred articles on a wide range of technical subjects.


Posts by Jonathan Knudsen:

 

Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent

By helping your fuzzer detect failure better with agent instrumentation, you can maximize the value of fuzz testing in your secure development life cycle.

Continue Reading...

Posted in Fuzz Testing | Comments Off on Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent

 

How to Cyber Security: Software testing is cool

Software security testing involves knocking down walls, scaling fences, and otherwise breaking applications to generate helpful feedback for development.

Continue Reading...

Posted in Application Security | Comments Off on How to Cyber Security: Software testing is cool

 

How to Cyber Security: Fuzzing does not mean random

The most efficient fuzzing happens not with random test cases but with targeted test cases generated from detailed data models and a powerful anomalizer.

Continue Reading...

Posted in Fuzz Testing | Comments Off on How to Cyber Security: Fuzzing does not mean random

 

How to Cyber Security: Application security is critical for data security

Data protection requires application security. Threat modeling and vulnerability management help you secure your apps from development through production.

Continue Reading...

Posted in Application Security, Software Architecture & Design | Comments Off on How to Cyber Security: Application security is critical for data security

 

Tips for working from home without losing your marbles or compromising security

Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time.

Continue Reading...

Posted in Application Security | Comments Off on Tips for working from home without losing your marbles or compromising security

 

How to Cyber Security: Software is manufacturing

Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA) | Comments Off on How to Cyber Security: Software is manufacturing

 

How to Cyber Security: It’s all about developers, except when it’s not

To get security testing results in front of developers, who are in the best position to address them effectively, you need automation and integration.

Continue Reading...

Posted in Application Security, Developer Enablement | Comments Off on How to Cyber Security: It’s all about developers, except when it’s not

 

How to Cyber Security: A journey of a thousand miles

If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower.

Continue Reading...

Posted in Application Security, Software Security Program | Comments Off on How to Cyber Security: A journey of a thousand miles

 

How to Cyber Security: Software is critical infrastructure

Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment.

Continue Reading...

Posted in Software Security Program | Comments Off on How to Cyber Security: Software is critical infrastructure

 

How to Cyber Security: Unicorns and donkeys

In a unicorn world, the cyber security group helps lift the organization and work security into all aspects of software development and operations.

Continue Reading...

Posted in Security Training & Awareness, Software Security Program | Comments Off on How to Cyber Security: Unicorns and donkeys