Software Integrity Blog

Search Results for 'government security'

 

Ask the Experts: What are the biggest cyber security threats for 2020?

What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.

Continue Reading...

Posted in Application Security, Data Breach Security

 

Vandana Verma: Passionate guide for the web application security journey

Vandana Verma, security architect at IBM India Software Labs and web application security expert, shares her advice on tools, training, and shifting left.

Continue Reading...

Posted in Web Application Security

 

The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come?

Continue Reading...

Posted in Software Compliance, Quality & Standards

 

Ask the Experts: What’s the top cloud migration security risk?

We’ve gathered some expert opinions about the top cloud migration security risks that organizations should think about when moving to the cloud.

Continue Reading...

Posted in Cloud Security

 

Your application security testing tool just got acquired. Now what?

A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.

Continue Reading...

Posted in Interactive Application Security Testing (IAST)

 

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach Security, Healthcare Security & Privacy, Software Security Program

 

Tips for recruiting top cyber security talent (and mistakes to avoid)

The cyber security job market is hot, and common recruiting mistakes can keep new talent away. Here are some do’s and don’ts for cyber security recruiting.

Continue Reading...

Posted in Security Training & Awareness

 

The state of cybersecurity in the physical security industry

The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems.

Continue Reading...

Posted in IoT Security

 

[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

In our software compliance webinar, Matan Scharf (Synopsys) explains the hidden security dangers of software standardization. Available on demand.

Continue Reading...

Posted in Software Compliance, Quality & Standards, Webinars

 

Feds seek to up their cybersecurity game

Recent government cybersecurity initiatives assume that the federal government has a role to play in securing the IoT and critical infrastructure. Does it?

Continue Reading...

Posted in IoT Security