If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower.
A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap.
Posted in Software Security Program | Comments Off on Report: Cyber threats growing, but security responses aren’t keeping pace
Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment.
Posted in Software Security Program | Comments Off on How to Cyber Security: Software is critical infrastructure
Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.
Posted in Container Security, Mergers & Acquisitions, Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] Container security, tool misuse and abuse, open source in M&A
Here are 5 lessons we’ve learned from 10 years of the BSIMM: There are no special snowflakes, but your firm is unique. People are essential, but they can’t do everything. And pen testing is never enough.
Posted in Software Security Program | Comments Off on [Infographic] 5 lessons learned from the BSIMM
A security group should help lift the organization into a positive, proactive attitude and work security into all aspects of development and operations.
The Building Security In Maturity Model (BSIMM) can help you improve your software security program, regardless of industry, size, or application mix.
Posted in Software Security Program | Comments Off on [Infographic] 7 truths to improve your software security program
Synopsys CSO Deirdre Hanford discusses what we learned from Cybersecurity Awareness Month, as well as how to create and mature a software security program.
Learn about five ways to approach risk ranking in vulnerability management, and hear key insights into real-life software security programs from BSIMM10.
How do you vet the security of third-party software from vendors, partners, and contractors? Follow software supply chain risk management best practices.
Posted in Software Security Program | Comments Off on Don’t let your supply chain undermine your security