Software Integrity

Archive for the 'Ethical Hacking' Category

 

Synopsys launches the Fault Injection Podcast

Fault Injection is a podcast from Synopsys that digs into software quality and security issues. Hosts Chris Clark, Principal Security Engineer at Synopsys, and Robert Vamosi, CISSP and Security Strategist at Synopsys, provide a forum for industry experts to talk about software security topics and their intersection with specific verticals such as medical, automotive, and […]

Continue Reading...

Posted in Application Security, Ethical Hacking, Network Security, Software Security Testing, Web Application Security | Comments Off on Synopsys launches the Fault Injection Podcast

 

Responsible disclosure on a timetable

In response to its haphazard patch release cycle in the late 1990s, Microsoft launched an every second-Tuesday-of-the-month “Patch Tuesday” program in 2004. Last week, on February 14 to be exact, Microsoft abruptly canceled its current monthly set of patches and said that its slate of new patches would return on March 14. The problem is […]

Continue Reading...

Posted in Ethical Hacking, Healthcare Security, Vulnerability Assessment | Comments Off on Responsible disclosure on a timetable

 

5 security industry buzzwords we love to hate

Computing security is an interesting space. One of the main aspects that makes it interesting is that there are many security terms that are ambiguous. With some words, we have no idea why we’ve come to use them! While these buzzwords aren’t going away any time soon, here is a list of buzzwords that most of the […]

Continue Reading...

Posted in Cloud Security, Ethical Hacking, Software Security Testing | Comments Off on 5 security industry buzzwords we love to hate

 

How to respond to application security incidents

Application security incidents cause serious disruption and scrutiny for any company. Fingers will be pointed, blame will be cast, and heads will roll. But right now all that matters is how you respond. Security incidents are also far more common than you think. To illustrate this point, set up a baseline CentOS VM and give […]

Continue Reading...

Posted in Application Security, Ethical Hacking, Static Analysis (SAST) | Comments Off on How to respond to application security incidents

 

The 2016 Pwnie Award nominees announced

On Monday the Tenth Annual The Pwnie Awards nominations were announced in 16 categories. The awards, literally a spray-painted My Little Pony, are given out each year at the Black Hat USA conference will take place on Aug 3rd, 2016 in Las Vegas. The awards are “judged by a panel of respected security researchers – […]

Continue Reading...

Posted in Ethical Hacking, Security Conference or Event | Comments Off on The 2016 Pwnie Award nominees announced

 

Russian bug bounty program to target government software

In a bid to harden government software in Russia, the government is discussing a possible bug bounty program. Deputy Communications Minister Aleksei Sokolov said the Russian government is considering what would be one of the first government-run bug bounties. The program would first apply to government-approved software and might expand beyond that. The Russian news […]

Continue Reading...

Posted in Ethical Hacking, Government Security, Vulnerability Assessment | Comments Off on Russian bug bounty program to target government software