Software Integrity Blog

Author Archive

Jonathan Knudsen

jknudsen

Jonathan Knudsen likes to break things. He has tested all kinds of software, from network infrastructure and medical devices to cryptocurrency nodes. Jonathan has worked as a developer, consultant, and author. He has published books about 2D graphics, cryptography, and Lego robots, and has written more than one hundred articles on a wide range of technical subjects.


Posts by Jonathan Knudsen:

 

How to cyber security: Addressing security fatigue

Addressing security fatigue with small changes to your AppSec strategy can help you manage and minimize risks in your applications. 

Continue Reading...

Posted in Managing security risks

 

How to cyber security: Embedding security into every phase of the SDLC

Creating a secure software development life cycle can lower risk, but security must be embedded into every step to ensure more secure applications.

Continue Reading...

Posted in Building secure software

 

How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration

DevSecOps is a team effort. Learn how to build security into DevOps to deliver secure, high-quality software faster using SAST and SCA software solutions.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Building secure software

 

CyRC Vulnerability Advisory: Denial of service vulnerabilities in RabbitMQ, EMQ X, and VerneMQ

CVE-2021-22116, CVE-2021-33175, and CVE-2021-33176 are denial of service vulnerabilities in three popular open source message broker applications.

Continue Reading...

Posted in Security news and research, Software Security Research

 

How to cyber security: Leverage AST solution data to make risk-based decisions

AST solutions provide insights to help organizations make more-informed decisions about their security investments.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Application Security, Managing security risks

 

How to cyber security: 5G is not magic

5G is faster than its predecessor but that doesn’t change the approach to software security for your applications.

Continue Reading...

Posted in Building secure software, IoT Security

 

How to cyber security: Minimize risk and testing time with Intelligent Orchestration

Integrating AST tools into your CI/CD pipeline shouldn’t compromise your development velocity. Learn how Intelligent Orchestration can help.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Building secure software

 

How to cyber security: Containerizing fuzzing targets

Achieve repeatable, consistent testing results in a controlled environment using containerization with fuzz testing.

Continue Reading...

Posted in Application Security, Building secure software

 

How to cyber security: Faceplanting in 10 lines of code

Failure to address security early in the software development life cycle can increase business risks. Learn how a proactive, holistic approach helps achieve more-secure software.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Building secure software

 

How to cyber security: Software security is everyone’s responsibility

The burden of software security often falls solely on security teams, but to be successful, organizations need to make security a team effort.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Managing security risks