Software Integrity Blog

Archive for the 'Software Security Program' Category

 

[Webinar] How Open Source Made Me a Better Manager

Learn about management practices inspired by open source principles, such as allowing the best ideas to guide the team, no matter who brings them up.

Continue Reading...

Posted in Software Security Program, Webinars | Comments Off on [Webinar] How Open Source Made Me a Better Manager

 

[Webinars] SAST and SCA together, managed pen testing for risk management

Learn how to combine SAST and SCA to find and fix more security and quality issues, and how managed pen testing supports your risk management strategy.

Continue Reading...

Posted in Software Composition Analysis (SCA), Software Security Program, Static Analysis (SAST), Webinars | Comments Off on [Webinars] SAST and SCA together, managed pen testing for risk management

 

Want to comply with privacy laws? Start with security

How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach.

Continue Reading...

Posted in Data Breach Security, Software Compliance, Quality & Standards, Software Security Program | Comments Off on Want to comply with privacy laws? Start with security

 

How to Cyber Security: A journey of a thousand miles

If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower.

Continue Reading...

Posted in Application Security, Software Security Program | Comments Off on How to Cyber Security: A journey of a thousand miles

 

Report: Cyber threats growing, but security responses aren’t keeping pace

A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap.

Continue Reading...

Posted in Software Security Program | Comments Off on Report: Cyber threats growing, but security responses aren’t keeping pace

 

How to Cyber Security: Software is critical infrastructure

Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment.

Continue Reading...

Posted in Software Security Program | Comments Off on How to Cyber Security: Software is critical infrastructure

 

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.

Continue Reading...

Posted in Container Security, Mergers & Acquisitions, Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] Container security, tool misuse and abuse, open source in M&A

 

[Infographic] 5 lessons learned from the BSIMM

Here are 5 lessons we’ve learned from 10 years of the BSIMM: There are no special snowflakes, but your firm is unique. People are essential, but they can’t do everything. And pen testing is never enough.

Continue Reading...

Posted in Software Security Program | Comments Off on [Infographic] 5 lessons learned from the BSIMM

 

How to Cyber Security: Unicorns and donkeys

In a unicorn world, the cyber security group helps lift the organization and work security into all aspects of software development and operations.

Continue Reading...

Posted in Security Training & Awareness, Software Security Program | Comments Off on How to Cyber Security: Unicorns and donkeys

 

[Infographic] 7 truths to improve your software security program

The Building Security In Maturity Model (BSIMM) can help you improve your software security program, regardless of industry, size, or application mix.

Continue Reading...

Posted in Software Security Program | Comments Off on [Infographic] 7 truths to improve your software security program