Software Integrity Blog

Archive for the 'Webinars' Category

 

[Webinar] Vulnerability reporting alternatives to NVD data feeds

National Vulnerability Database provide valuable information on newly reported vulnerabilities. But there’s a better, faster alternative to NVD data feeds.

Continue Reading...

Posted in Open Source Security, Webinars | Comments Off on [Webinar] Vulnerability reporting alternatives to NVD data feeds

 

[Webinars] DevOps, security tool abuse, Coverity and Threadfix

Practice DevSecOps with automated continuous testing, defend your apps from security tool misuse, and learn how Coverity and ThreadFix enable developers.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Developer Enablement, Webinars | Comments Off on [Webinars] DevOps, security tool abuse, Coverity and Threadfix

 

[Webinars] Cloud security and open source licensing

Learn how to adopt a cloud-native model for application security and how to mitigate legal risk by better understanding open source licensing obligations.

Continue Reading...

Posted in Cloud Security, Open Source Security, Webinars | Comments Off on [Webinars] Cloud security and open source licensing

 

[Webinars] DevSecOps, JavaScript security, and automotive security

Learn how to reduce your anxiety with DevSecOps, review JavaScript security in modern applications, and improve automotive cyber security after production.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Automotive Security, Web Application Security, Webinars | Comments Off on [Webinars] DevSecOps, JavaScript security, and automotive security

 

[Webinars] Software supply chain and open source scans

Learn how different open source scans create different value for M&A transactions, and how binary analysis can help you secure your software supply chain.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Webinars | Comments Off on [Webinars] Software supply chain and open source scans

 

[Webinars] Software audits for M&A and secure programming

Bring more value to your M&A clients with software audits, and learn how to build a culture of secure programming in your organization in our new webinars.

Continue Reading...

Posted in Developer Enablement, Mergers & Acquisitions, Webinars | Comments Off on [Webinars] Software audits for M&A and secure programming

 

Q&A: Interactive application security testing (IAST) and Seeker

Do you have questions about IAST? We’ve got answers, explanations, and recommendations. Read our responses to audience questions from our last IAST webinar.

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Webinars | Comments Off on Q&A: Interactive application security testing (IAST) and Seeker

 

[Webinars] Tech due diligence and AppSec tools for developers

Learn how to manage your software asset risk in tech due diligence, and discover AppSec tools and techniques to enable your developers to build security in.

Continue Reading...

Posted in Developer Enablement, Mergers & Acquisitions, Webinars | Comments Off on [Webinars] Tech due diligence and AppSec tools for developers

 

[Webinars] Software security metrics and open source security

Learn how to drive your software security initiative with metrics, and get practical advice for open source security with Red Hat, in our new webinars.

Continue Reading...

Posted in Maturity Model (BSIMM), Open Source Security, Webinars | Comments Off on [Webinars] Software security metrics and open source security

 

[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

In our software compliance webinar, Matan Scharf (Synopsys) explains the hidden security dangers of software standardization. Available on demand.

Continue Reading...

Posted in Security Standards and Compliance, Webinars | Comments Off on [Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin