Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

What AppSec tools are in your DevOps toolshed?

AppSec tools are essential to creating secure applications and preventing data breach. But how do you integrate them effectively into your DevOps workflow?

Continue Reading...

Posted in Agile, CI/CD & DevOps | Comments Off on What AppSec tools are in your DevOps toolshed?

 

Synopsys adds two more awards to its 2019 winning streak

The 2019 Stevie® Awards have been announced. Two of our AppSec products made the final cut in the DevOps Solution category: Seeker and Black Duck OpsSight.

Continue Reading...

Posted in General | Comments Off on Synopsys adds two more awards to its 2019 winning streak

 

Despite ongoing warnings, U.S. critical infrastructure remains vulnerable

The state of ICS security (which protects the industrial control systems that power our critical infrastructure) is worrying. How can we start to improve it?

Continue Reading...

Posted in General | Comments Off on Despite ongoing warnings, U.S. critical infrastructure remains vulnerable

 

Feds seek to up their cybersecurity game

Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?

Continue Reading...

Posted in Internet of Things | Comments Off on Feds seek to up their cybersecurity game

 

Defense alone won’t stop cyber threat to U.S. finance

The Fed’s responsibility for financial cyber security is ill-defined. But the financial sector is facing the threat of cyber war; something has to be done.

Continue Reading...

Posted in Financial Services Security | Comments Off on Defense alone won’t stop cyber threat to U.S. finance

 

Connected cars: Security and privacy are both trust hurdles

The world is clamoring for connected vehicles, even with their persistent cyber security and privacy issues. What does the future of V2X have in store?

Continue Reading...

Posted in Automotive Security | Comments Off on Connected cars: Security and privacy are both trust hurdles

 

Application security survey at RSA: The good, the bad, and the ugly

Our RSA 2019 survey on the state of application security collected dozens of responses and highlighted some notable trends. Take a look at what we found out.

Continue Reading...

Posted in General | Comments Off on Application security survey at RSA: The good, the bad, and the ugly

 

Experts talk application security at RSA

We asked a couple of AppSec experts and BSIMM participants about 2019 application security trends, challenges, obstacles, and solutions. Here’s what they said.

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on Experts talk application security at RSA

 

How to protect sensitive data by managing your risk

Want to know how to protect sensitive data? You need a solution to manage risk across your enterprise applications so you can secure them before they go live.

Continue Reading...

Posted in General | Comments Off on How to protect sensitive data by managing your risk

 

The cyber-physical convergence is accelerating—and so are the risks

Cyber-physical attacks are on the rise. As the IoT creeps further into our daily lives, so does the attack surface. What can we do to keep ourselves safe?

Continue Reading...

Posted in Internet of Things | Comments Off on The cyber-physical convergence is accelerating—and so are the risks