Software Integrity Blog

Author Archive

Julian Alvarado

julian-alvarado

Julian Alvarado is a digital marketing professional with three years of experience developing, editing, and managing online content. Mr. Alvarado is passionate about storytelling and has transferred that passion to content marketing after completing his undergraduate and graduate degree in the biological sciences. While some may find this transition curious, Mr. Alvarado has been able to leverage his analytical mode of thinking and attention to detail to examine trends in customer behavior, creating data-driven content that captures the attention of any given audience.


Posts by Julian Alvarado:

 

How to secure cloud apps: The ultimate guide

Are you hesitant to adopt the cloud because of security concerns? Our new guide explains how to secure cloud apps from design to development and deployment.

Continue Reading...

Posted in Cloud Security | Comments Off on How to secure cloud apps: The ultimate guide

 

8 must-have features in an IAST solution

With so many vendors to choose from, finding the perfect IAST solution for your organization’s needs can be difficult. Here’s a checklist of 8 must-have features for any good IAST tool.

Continue Reading...

Posted in Interactive Application Security Testing (IAST) | Comments Off on 8 must-have features in an IAST solution

 

How to think about container security

Are you thinking about container security? Traditional application security isn’t meant for container deployments. Learn strategies for securing your containers.

Continue Reading...

Posted in Container Security | Comments Off on How to think about container security

 

The IoT within us: Network-connected medical devices

The Internet of Things is all around us. But it doesn’t stop there—now it’s inside us too. As the era of “connected everything” explodes, so does the use of network-connected medical devices. These interconnected devices, ranging from hospital imaging equipment to implantable pacemakers to infusion pumps, help healthcare providers and patients in a variety of tasks—monitoring vitals, regulating dosages, improving diagnostics, and more. But the convenience of this functionality comes with a trade-off: vulnerability. If attackers gain access to a connected medical device, the potential consequences include severe injury and even death. Consider this:

Continue Reading...

Posted in General, Healthcare Security, Internet of Things, Medical Device Security | Comments Off on The IoT within us: Network-connected medical devices