Software Integrity Blog

Archive for the 'Application Security' Category

 

Report: Security and development teams need to ‘embrace’ new roles in DevSecOps

For sustainable, long-term application security, both developers and information security professionals must embrace their new roles created by DevSecOps.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Application Security | Comments Off on Report: Security and development teams need to ‘embrace’ new roles in DevSecOps

 

Multiple bills seek to secure elections: Will they do it?

A number of election security bills and discussion drafts are currently before the House and Senate. If passed, could they really lead to secure elections?

Continue Reading...

Posted in Application Security | Comments Off on Multiple bills seek to secure elections: Will they do it?

 

Ask the Experts: How has software security improved in the last few years?

For Thanksgiving, let’s talk about what we’re thankful for: the trends, processes, and technologies that have had a positive impact on software security.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Application Security, Cloud Security, Featured, Software Compliance, Quality & Standards | Comments Off on Ask the Experts: How has software security improved in the last few years?

 

Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

Synopsys CSO Deirdre Hanford discusses what we learned from Cybersecurity Awareness Month, as well as how to create and mature a software security program.

Continue Reading...

Posted in Application Security, Featured, Software Security Program | Comments Off on Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

 

It’s past time to put passwords out of our misery

No password is secure. With so many password alternatives now available, such as FIDO and passwordless authentication, we can get rid of passwords for good.

Continue Reading...

Posted in Application Security, Software Architecture & Design | Comments Off on It’s past time to put passwords out of our misery

 

Best practices for secure application development

Application security is your best defense against the hackers who want your organization’s data. Here are best practices for secure application development.

Continue Reading...

Posted in Application Security | Comments Off on Best practices for secure application development

 

Hackers needed to defeat hackers

What are ethical hackers, and why do we need them? Ethical hacking allows you to see how your systems might be breached, but it goes far beyond pen testing.

Continue Reading...

Posted in Application Security, Security Training & Awareness | Comments Off on Hackers needed to defeat hackers

 

Chain Heist and blockchain security at DEF CON 2019

Chain Heist, our blockchain capture-the-flag at DEF CON 2019, showed that vulnerability detection tooling for blockchain security still has a way to go.

Continue Reading...

Posted in Application Security | Comments Off on Chain Heist and blockchain security at DEF CON 2019

 

Apple’s $1 million bug bounty could launch arms race for zero-days

Experts have given kudos to Apple for expanding its bug bounty program to all researchers. But is the $1 million top prize enough to turn black hats white?

Continue Reading...

Posted in Application Security | Comments Off on Apple’s $1 million bug bounty could launch arms race for zero-days

 

Guide to Application Security: What to Look For and Why

In Guide to Application Security, our new white paper, you’ll learn more about AppSec tools and how to leverage them in enterprise application development.

Continue Reading...

Posted in Application Security | Comments Off on Guide to Application Security: What to Look For and Why