Software Integrity Blog

Author Archive

Jonathan Knudsen

jknudsen

Jonathan Knudsen likes to break things. He has tested all kinds of software, from network infrastructure and medical devices to cryptocurrency nodes. Jonathan has worked as a developer, consultant, and author. He has published books about 2D graphics, cryptography, and Lego robots, and has written more than one hundred articles on a wide range of technical subjects.


Posts by Jonathan Knudsen:

 

How to cyber security: Software security is everyone’s responsibility

The burden of software security often falls solely on security teams, but to be successful, organizations need to make security a team effort.

Continue Reading...

Posted in Agile, CI/CD, & DevOps, Managing security risks

 

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

In part two of this series, learn how to create a data model for the Bitcoin network protocol and use the Defensics SDK to perform fuzzing on bitcoind.

Continue Reading...

Posted in Building secure software, Developer Enablement, Fuzz Testing

 

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first part of a two-part advanced technical tutorial that describes how you can use the Defensics SDK to set up your own Bitcoin network.

Continue Reading...

Posted in Fuzz Testing

 

How to cyber security: Gotta go fast … but why?

DevSecOps allows organizations to deliver applications at a high velocity using iteration and automation to better serve customers.

Continue Reading...

Posted in Agile, CI/CD, & DevOps, Building secure software

 

New survey shows integrating application security testing gaining traction in DevOps

DevOps can break traditional application security testing processes & tools. Learn why an integrated DevSecOps approach is critical to building better code.

Continue Reading...

Posted in Agile, CI/CD, & DevOps, Application Security, Security news and research

 

How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration

DevSecOps is a team effort. Learn how to build security into DevOps to deliver secure, high-quality software faster using SAST and SCA software solutions.

Continue Reading...

Posted in Agile, CI/CD, & DevOps, Building secure software

 

How to cyber security: Pain in the *AST

What’s the difference between IT security and application security? And what do all those acronyms mean? Learn more in our quick cyber security primer.

Continue Reading...

Posted in Application Security, Managing security risks

 

How to Cyber Security: Fuzz a tank

With the Defensics SDK, you can create fuzzing test suites for any type of data. In this article, we demonstrate how to start modeling a custom protocol.

Continue Reading...

Posted in Building secure software, Fuzz Testing

 

Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent

By helping your fuzzer detect failure better with agent instrumentation, you can maximize the value of fuzz testing in your secure development life cycle.

Continue Reading...

Posted in Building secure software, Fuzz Testing

 

How to Cyber Security: Software testing is cool

Software security testing involves knocking down walls, scaling fences, and otherwise breaking applications to generate helpful feedback for development.

Continue Reading...

Posted in Application Security, Building secure software