Software Integrity Blog

Author Archive

Taylor Armerding

tarmerding

Taylor Armerding is an award-winning journalist who left the declining field of mainstream newspapers in 2011 to write in the explosively expanding field of information security. He has previously written for CSO Online and the Sophos blog Naked Security. When he’s not writing he hikes, bikes, golfs, and plays bluegrass music. Follow him on Twitter @tarmerding2.


Posts by Taylor Armerding:

 

Best practices for secure application development

Application security is your best defense against the hackers who want your organization’s data. Here are best practices for secure application development.

Continue Reading...

Posted in Application Security | Comments Off on Best practices for secure application development

 

How to choose application security vendors and tools

Unless you build your own AppSec tools, you need to know how to choose an application security vendor and whether to opt for individual tools or a suite.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Software Composition Analysis (SCA) | Comments Off on How to choose application security vendors and tools

 

Synopsys CSO Deirdre Hanford champions Cybersecurity Awareness Month

We kick off Cybersecurity Awareness Month with an interview with Deirdre Hanford, CSO at Synopsys, about personal accountability and cyber security.

Continue Reading...

Posted in News & Announcements | Comments Off on Synopsys CSO Deirdre Hanford champions Cybersecurity Awareness Month

 

Hackers needed to defeat hackers

What are ethical hackers, and why do we need them? Ethical hacking allows you to see how your systems might be breached, but it goes far beyond pen testing.

Continue Reading...

Posted in Application Security, Security Training & Awareness | Comments Off on Hackers needed to defeat hackers

 

The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come?

Continue Reading...

Posted in Software Compliance, Quality & Standards | Comments Off on The False Claims Act: 156 years old and newly relevant to software security

 

Awash in regulations, companies struggle with compliance

The list of regulatory compliance challenges facing companies grows longer every time a new regulation is introduced. But do security regulations even work?

Continue Reading...

Posted in Software Compliance, Quality & Standards | Comments Off on Awash in regulations, companies struggle with compliance

 

Software quality: It can be a matter of life and death

Safety-critical software powers everything from airplanes to power plants, defib machines, and seatbelts. And quality issues can lead to injury and death.

Continue Reading...

Posted in Software Compliance, Quality & Standards | Comments Off on Software quality: It can be a matter of life and death

 

Apple’s $1 million bug bounty could launch arms race for zero-days

Experts have given kudos to Apple for expanding its bug bounty program to all researchers. But is the $1 million top prize enough to turn black hats white?

Continue Reading...

Posted in Application Security | Comments Off on Apple’s $1 million bug bounty could launch arms race for zero-days

 

Synopsys adds more awards to its 2019 winning streak

Seeker IAST won a Gold International Stevie Award for DevOps Solution, and our Polaris platform won for Software Development Solution.

Continue Reading...

Posted in News & Announcements | Comments Off on Synopsys adds more awards to its 2019 winning streak

 

Mobile apps: Insecure by default

There’s a lack of robust mobile app security on billions of devices people carry around. Why is it such a problem, and what can developers do to solve it?

Continue Reading...

Posted in Mobile App Security | Comments Off on Mobile apps: Insecure by default