Software Integrity Blog

Archive for the 'Application Security' Category

 

Behshad Rejai on the past, present, and future of software development

With 36 years of experience, Behshad Rejai, VP of engineering in the Software Integrity Group, shares her views of the future of software development.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Application Security, Cloud Security, Featured, IoT Security | Comments Off on Behshad Rejai on the past, present, and future of software development

 

Ask the Experts: What are the biggest cyber security threats for 2020?

What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.

Continue Reading...

Posted in Application Security, Data Breach Security | Comments Off on Ask the Experts: What are the biggest cyber security threats for 2020?

 

The blockchain train: Get on board—with caution

What are the best ways to make enterprise blockchain platforms more secure? Test them, analyze them, and get the bugs out before exposing them to the world.

Continue Reading...

Posted in Application Security | Comments Off on The blockchain train: Get on board—with caution

 

SAST vs. SCA: What’s the difference? Do I need both?

Learn how to combine static application security testing (SAST) and software composition analysis (SCA) to strengthen your software security program.

Continue Reading...

Posted in Application Security, Software Composition Analysis (SCA), Static Analysis (SAST) | Comments Off on SAST vs. SCA: What’s the difference? Do I need both?

 

Report: Security and development teams need to ‘embrace’ new roles in DevSecOps

For sustainable, long-term application security, both developers and information security professionals must embrace their new roles created by DevSecOps.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Application Security | Comments Off on Report: Security and development teams need to ‘embrace’ new roles in DevSecOps

 

Multiple bills seek to secure elections: Will they do it?

A number of election security bills and discussion drafts are currently before the House and Senate. If passed, could they really lead to secure elections?

Continue Reading...

Posted in Application Security | Comments Off on Multiple bills seek to secure elections: Will they do it?

 

Ask the Experts: How has software security improved in the last few years?

For Thanksgiving, let’s talk about what we’re thankful for: the trends, processes, and technologies that have had a positive impact on software security.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Application Security, Cloud Security, Software Compliance, Quality & Standards | Comments Off on Ask the Experts: How has software security improved in the last few years?

 

Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

Synopsys CSO Deirdre Hanford discusses what we learned from Cybersecurity Awareness Month, as well as how to create and mature a software security program.

Continue Reading...

Posted in Application Security, Software Security Program | Comments Off on Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

 

It’s past time to put passwords out of our misery

No password is secure. With so many password alternatives now available, such as FIDO and passwordless authentication, we can get rid of passwords for good.

Continue Reading...

Posted in Application Security, Software Architecture & Design | Comments Off on It’s past time to put passwords out of our misery

 

Best practices for secure application development

Application security is your best defense against the hackers who want your organization’s data. Here are best practices for secure application development.

Continue Reading...

Posted in Application Security | Comments Off on Best practices for secure application development