Software Integrity Blog

Archive for the 'Featured' Category


How to Cyber Security: Fuzz a tank

With the Defensics SDK, you can create fuzzing test suites for any type of data. In this article, we demonstrate how to start modeling a custom protocol.

Continue Reading...

Posted in Featured, Fuzz Testing


How to get compliance audit training in the new virtual workplace

Compliance training will help you pass an audit, but to secure your customer data, your teams need virtual security training beyond compliance requirements.

Continue Reading...

Posted in Featured, Security Training & Awareness, Software Compliance, Quality & Standards


6 mistakes to avoid when choosing a managed services provider

It’s critical to find the right managed services provider. Here are 6 things to consider when searching for the best provider to meet your business needs.

Continue Reading...

Posted in Application Security, Featured, Software Security Program