Software Integrity Blog

Are you making software security a requirement?

Robust software security requirements help you lock down what your software does so that it can be used only as intended. Learn how to build your own.

Continue Reading...

How to overcome 4 software security training challenges

If you face any of these four software security training challenges, we have some tips to help you overcome them and get your team the training they need.

Continue Reading...

[Webinars] Binary scanning, software supply chain management

In this week’s webinars, we’ll talk about binary scanning techniques and challenges, and how to reduce your risk with software supply chain management.

Continue Reading...

The ins and outs of fuzz testing with Defensics: Q&A

In our webinar, we talked about preparing for zero-day attacks using fuzz testing, as well as Defensics system compatibility, fuzzing techniques, and more.

Continue Reading...

[Webinars] Implementing SAST, reducing open source risk in M&A

In this week’s webinars, we’ll talk about how to add static analysis to your development cycle and how to minimize open source risk in M&A transactions.

Continue Reading...

3 reasons to join us at FLIGHT Europe 2020 Virtual Conference

At FLIGHT Europe 2020, we’ll have two advanced product training sessions, tracks in application security and open source, and plenty of virtual networking.

Continue Reading...

Open source audits: The secret ingredient for successful M&A

Identifying open source in the target’s codebase is essential to M&A transactions involving software. Open source audits go far beyond what SCA can provide.

Continue Reading...

[Webinars] Static analysis best practices, remote security testing and training

In this week’s webinars, we’ll share how to get the most out of your static analysis tool and how to make the transition from on-site to remote testing.

Continue Reading...

Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent

By helping your fuzzer detect failure better with agent instrumentation, you can maximize the value of fuzz testing in your secure development life cycle.

Continue Reading...

Are you following the top 10 software security best practices?

Software security isn’t simply plug-and-play. Our top 10 software security best practices show you how to get the best return on your investment.

Continue Reading...