Software Integrity Blog

Archive for the 'Software Security Program' Category

 

How to Cyber Security: A journey of a thousand miles

If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower.

Continue Reading...

Posted in Application Security, Featured, Software Security Program | Comments Off on How to Cyber Security: A journey of a thousand miles

 

Report: Cyber threats growing, but security responses aren’t keeping pace

A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap.

Continue Reading...

Posted in Software Security Program | Comments Off on Report: Cyber threats growing, but security responses aren’t keeping pace

 

How to Cyber Security: Software is critical infrastructure

Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment.

Continue Reading...

Posted in Software Security Program | Comments Off on How to Cyber Security: Software is critical infrastructure

 

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.

Continue Reading...

Posted in Container Security, Mergers & Acquisitions, Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] Container security, tool misuse and abuse, open source in M&A

 

[Infographic] 5 lessons learned from the BSIMM

Here are 5 lessons we’ve learned from 10 years of the BSIMM: There are no special snowflakes, but your firm is unique. People are essential, but they can’t do everything. And pen testing is never enough.

Continue Reading...

Posted in Software Security Program | Comments Off on [Infographic] 5 lessons learned from the BSIMM

 

How to Cyber Security: Unicorns and donkeys

A security group should help lift the organization into a positive, proactive attitude and work security into all aspects of development and operations.

Continue Reading...

Posted in Security Training & Awareness, Software Security Program | Comments Off on How to Cyber Security: Unicorns and donkeys

 

[Infographic] 7 truths to improve your software security program

The Building Security In Maturity Model (BSIMM) can help you improve your software security program, regardless of industry, size, or application mix.

Continue Reading...

Posted in Software Security Program | Comments Off on [Infographic] 7 truths to improve your software security program

 

Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

Synopsys CSO Deirdre Hanford discusses what we learned from Cybersecurity Awareness Month, as well as how to create and mature a software security program.

Continue Reading...

Posted in Application Security, Software Security Program | Comments Off on Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

 

[Webinars] How to risk rank vulnerabilities, insights from BSIMM10

Learn about five ways to approach risk ranking in vulnerability management, and hear key insights into real-life software security programs from BSIMM10.

Continue Reading...

Posted in Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] How to risk rank vulnerabilities, insights from BSIMM10

 

Don’t let your supply chain undermine your security

How do you vet the security of third-party software from vendors, partners, and contractors? Follow software supply chain risk management best practices.

Continue Reading...

Posted in Software Security Program | Comments Off on Don’t let your supply chain undermine your security