Software Integrity Blog

Archive for the 'Webinars' Category

 

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.

Continue Reading...

Posted in Container Security, Mergers & Acquisitions, Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] Container security, tool misuse and abuse, open source in M&A

 

[Webinar] Static Analysis Security Testing (SAST) in CI/CD: Why and How

Learn how to add static application security testing (SAST) to your CI/CD workflows to constantly verify code changes and improve application integrity.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Static Analysis (SAST), Webinars | Comments Off on [Webinar] Static Analysis Security Testing (SAST) in CI/CD: Why and How

 

[Webinar] OWASP Top 10 for JavaScript Developers

The OWASP documentation doesn’t give much attention to JavaScript. This webinar explains the OWASP Top 10 in terms of JavaScript vulnerabilities.

Continue Reading...

Posted in Software Compliance, Quality & Standards, Web Application Security, Webinars | Comments Off on [Webinar] OWASP Top 10 for JavaScript Developers

 

[Webinars] CI/CD optimization and automated testing, open source audit reports

Learn how our CloudBees partnership helps users optimize CI/CD and automate AppSec Testing, and steps to take after you get an open source audit report.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Mergers & Acquisitions, Open Source Security, Webinars | Comments Off on [Webinars] CI/CD optimization and automated testing, open source audit reports

 

[Webinars] How to risk rank vulnerabilities, insights from BSIMM10

Learn about five ways to approach risk ranking in vulnerability management, and hear key insights into real-life software security programs from BSIMM10.

Continue Reading...

Posted in Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] How to risk rank vulnerabilities, insights from BSIMM10

 

[Webinars] Evidence-based security, design and code quality in tech M&A

Learn how to improve software security using evidence-based standards, and why you should inspect design and code quality during technical due diligence.

Continue Reading...

Posted in Mergers & Acquisitions, Software Compliance, Quality & Standards, Webinars | Comments Off on [Webinars] Evidence-based security, design and code quality in tech M&A

 

[Webinars] NVD data feed alternatives and software security metrics

Learn about a better, faster alternative to NVD vulnerability data feeds and how to measure software security effectiveness and use metrics to drive change.

Continue Reading...

Posted in Open Source Security, Software Security Program, Webinars | Comments Off on [Webinars] NVD data feed alternatives and software security metrics

 

[Webinars] Automotive fuzz testing and financial services AppSec

Learn how agent instrumentation improves fuzz testing of automotive IVI and telematics systems, and about financial services application security.

Continue Reading...

Posted in Financial Cyber Security, Fuzz Testing, Webinars | Comments Off on [Webinars] Automotive fuzz testing and financial services AppSec

 

[Webinar] Black Duck Legal Certification Course

Learn about software due diligence and how to answer your clients’ open source questions in our Black Duck Legal Certification Course.

Continue Reading...

Posted in Mergers & Acquisitions, Open Source Security, Webinars | Comments Off on [Webinar] Black Duck Legal Certification Course

 

Q&A: Fuzz testing, agent instrumentation, and Defensics

Do you have questions about fuzz testing? We’ve got answers, explanations, and recommendations from our last webinar on fuzzing using agent instrumentation.

Continue Reading...

Posted in Automotive Cyber Security, Fuzz Testing, Webinars | Comments Off on Q&A: Fuzz testing, agent instrumentation, and Defensics