Software Integrity Blog

Author Archive

Jonathan Knudsen

jknudsen

Jonathan Knudsen likes to break things. He has tested all kinds of software, from network infrastructure and medical devices to cryptocurrency nodes. Jonathan has worked as a developer, consultant, and author. He has published books about 2D graphics, cryptography, and Lego robots, and has written more than one hundred articles on a wide range of technical subjects.


Posts by Jonathan Knudsen:

 

How to cyber security: Minimize risk and testing time with Intelligent Orchestration

Integrating AST tools into your CI/CD pipeline shouldn’t compromise your development velocity. Learn how Intelligent Orchestration can help.

Continue Reading...

Posted in Agile, CI/CD & DevOps

 

How to cyber security: Containerizing fuzzing targets

Achieve repeatable, consistent testing results in a controlled environment using containerization with fuzz testing.

Continue Reading...

Posted in Application Security

 

How to cyber security: Faceplanting in 10 lines of code

Failure to address security early in the software development life cycle can increase business risks. Learn how a proactive, holistic approach helps achieve more-secure software.

Continue Reading...

Posted in Agile, CI/CD & DevOps

 

How to cyber security: Software security is everyone’s responsibility

The burden of software security often falls solely on security teams, but to be successful, organizations need to make security a team effort.

Continue Reading...

Posted in Agile, CI/CD & DevOps

 

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

In part two of this series, learn how to create a data model for the Bitcoin network protocol and use the Defensics SDK to perform fuzzing on bitcoind.

Continue Reading...

Posted in Developer Enablement, Fuzz Testing

 

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first part of a two-part advanced technical tutorial that describes how you can use the Defensics SDK to set up your own Bitcoin network.

Continue Reading...

Posted in Fuzz Testing

 

How to cyber security: Gotta go fast … but why?

DevSecOps allows organizations to deliver applications at a high velocity using iteration and automation to better serve customers.

Continue Reading...

Posted in Agile, CI/CD & DevOps

 

New survey shows integrating application security testing gaining traction in DevOps

DevOps can break traditional application security testing processes & tools. Learn why an integrated DevSecOps approach is critical to building better code.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Application Security

 

How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration

DevSecOps is a team effort. Learn how to build security into DevOps to deliver secure, high-quality software faster using SAST and SCA software solutions.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Featured

 

How to cyber security: Pain in the *AST

What’s the difference between IT security and application security? And what do all those acronyms mean? Learn more in our quick cyber security primer.

Continue Reading...

Posted in Application Security