Software Integrity Blog

Archive for the 'Maturity Model (BSIMM)' Category

 

How to build a process around an application security tool

How do you ensure your application security tools are enablers rather than hurdles? By building application security processes around the tools you deploy.

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on How to build a process around an application security tool

 

Ask the Experts: How can software engineers support security efforts?

We’ve gathered some expert opinions about how software engineers can contribute to, improve, and even lead their organization’s software security program.

Continue Reading...

Posted in Featured, Maturity Model (BSIMM) | Comments Off on Ask the Experts: How can software engineers support security efforts?

 

[Webinars] NVD data feed alternatives and software security metrics

Learn about a better, faster alternative to NVD vulnerability data feeds and how to measure software security effectiveness and use metrics to drive change.

Continue Reading...

Posted in Maturity Model (BSIMM), Open Source Security, Webinars | Comments Off on [Webinars] NVD data feed alternatives and software security metrics

 

How proactive is your software security initiative?

A proactive software security initiative protects your organization. Does your software security measure up? Take our 12-question quiz to find out.

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on How proactive is your software security initiative?

 

BSIMM10: A decade of research on software security activities

BSIMM10 compiles a decade of research on software security activities in real-life firms into a guide for maturing your software security initiative.

Continue Reading...

Posted in Featured, Maturity Model (BSIMM), News & Announcements | Comments Off on BSIMM10: A decade of research on software security activities

 

[Infographic] BSIMM10 by the numbers

How many BSIMM participants have a software security group? How many think it’s key to their success? How many people are in the average SSG? Get the facts.

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on [Infographic] BSIMM10 by the numbers

 

Software security program checklist: Kick off your program with a bang

If you want to enjoy your Sunday kickoffs, our software security program checklist of five activities will help you kick off your program successfully.

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on Software security program checklist: Kick off your program with a bang

 

Securing software development: NIST joins the parade

The NIST Secure Software Development Framework (SSDF) is the latest standard aimed at improving software security. Can its novel approach help it succeed?

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on Securing software development: NIST joins the parade

 

It’s not just you they’re after—it’s your supply chain too

Supply chain attacks are not new. But as the supply chain grows longer and more complex, the attacks are evolving to keep up. Is your supply chain secure?

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on It’s not just you they’re after—it’s your supply chain too

 

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach, Healthcare Security, Maturity Model (BSIMM) | Comments Off on More medical mega-breaches thanks to third-party insecurity