Software Integrity

Archive for the 'Infographic' Category


BSIMM9 by the numbers

Over the past ten years, we’ve studied dozens of security activities performed by real-life firms to measure the software security practices used in organizations of different sizes, in different verticals, and at different levels of maturity. Quantifying these practices in the Building Security In Maturity Model (BSIMM) allows us to describe the common areas shared […]

Continue Reading...

Posted in Infographic, Maturity Model (BSIMM)


The IoT within us: Network-connected medical devices

The Internet of Things is all around us. But it doesn’t stop there—now it’s inside us too. As the era of “connected everything” explodes, so does the use of network-connected medical devices. These interconnected devices, ranging from hospital imaging equipment to implantable pacemakers to infusion pumps, help healthcare providers and patients in a variety of […]

Continue Reading...

Posted in Healthcare Security, Infographic, Internet of Things, Medical Device Security


Wading through the alphabet soup of application security testing tools: A guide to SAST, IAST, DAST, and RASP

Every application security testing tool has advantages and disadvantages. No single solution can ensure you find and fix all vulnerabilities. But application security tools can complement one another and help you secure your applications in each stage of the software development life cycle (SDLC) and beyond. Here’s a quick overview of SAST, IAST, DAST, and […]

Continue Reading...

Posted in Infographic, Interactive Application Security Testing (IAST), Static Analysis (SAST), Web Application Security


Infosecurity Europe highlights InfoSec concerns in Europe today

At Infosecurity Europe in June, we surveyed 275 attendees who visited our booth to get the pulse of InfoSec concerns in Europe today. We were delighted to learn that 90% of their organizations had a formal application security process in place, using a dedicated internal application security team or initiative, third-party providers, or a combination […]

Continue Reading...

Posted in Infographic, Webinar


Security IRL at RSA Conference 2018

We took the opportunity at RSA Conference last month to survey our booth visitors about their organizations’ application security programs. We’ve sponsored and conducted a number of surveys on topics ranging from DevSecOps to open source security to medical device security, but there’s something about collecting feedback from conference attendees in person that really hits home—a […]

Continue Reading...

Posted in Data Breach, Event, Infographic


Highlights from the 2018 Open Source Security and Risk Analysis Report

Download Infographic

Continue Reading...

Posted in Infographic, Open Source Security


What’s with the security / DevOps disconnect?

Download infographic  

Continue Reading...

Posted in Agile, CI/CD & DevOps, Infographic


Container adoption by the numbers

As application development teams are pressured to deliver software faster than ever, containers offer clear advantages. Docker debuted to the public in 2013, and since then there have been over 29 billion Docker container downloads. Benefits of containerization 66% of organizations adopting containers experienced accelerated developer efficiency 75% of companies achieved an increase in application […]

Continue Reading...

Posted in Containers, Infographic


What do the 4 CISO tribes say about software security in your firm?

  Where does software security really fit into your firm? We recently decided to conduct a study to find out. Gathering data in a series of in-person interviews with 25 chief information security officers (CISOs), our aim was to understand their strategies and approaches. The 2018 CISO Report presents the research findings. From the findings, […]

Continue Reading...

Posted in Infographic


A lack of software security training puts companies at risk

An old proverb states that if you give a man a fish, you feed him for a day; but, if you teach a man to fish, you feed him for life. Software security training aligns very well with this proverb. The majority of developers don’t come equipped with security skills. In fact 95% of software […]

Continue Reading...

Posted in Infographic, Security Training