Software Integrity Blog

Search Results for 'government security'

 

Experts talk application security at RSA

We asked a couple of AppSec experts and BSIMM participants about 2019 application security trends, challenges, obstacles, and solutions. Here’s what they said.

Continue Reading...

Posted in Software Security Program

 

The IoT: Still feature rich, security poor

How to prevent IoT hacks: Secure your software before you release it. It’s not that hard. So why aren’t more IoT device manufacturers doing it?

Continue Reading...

Posted in IoT Security

 

2019 software security predictions

Our experts share their 2019 software security predictions about AI/machine learning, design and standards, cloud adoption, and IoT, routers, and data in transit.

Continue Reading...

Posted in Application Security

 

President’s ‘cybersecurity moonshot’: Transformational or pie in the sky?

Making the internet safe and secure in 10 years isn’t going to be easy, if it’s even possible. And that’s why NSTAC’s new proposal is a cyber security moonshot.

Continue Reading...

Posted in Application Security

 

Cyber security: Not just ‘a’ job but many jobs of the future | NCSAM at Synopsys

Cyber security jobs are dynamic, stimulating, and in high demand as cyber threats multiply out of control. What can we do to make sure these jobs are filled?

Continue Reading...

Posted in Security Training & Awareness

 

CVE-2018-11776 and why you need Black Duck Security Advisories

Our researchers discovered 23 more versions of Struts vulnerable to CVE-2018-11776. The NVD won’t tell you that—but Black Duck Security Advisories will.

Continue Reading...

Posted in Open Source Security, Software Composition Analysis (SCA)

 

Medical device security improvements coming—but not anytime soon

Will the cyber security of medical devices improve with the FDA’s adoption of UL 2900-2-1? Most devices weren’t designed to be connected to the internet.

Continue Reading...

Posted in Healthcare Security & Privacy, Medical Device Security

 

Electoral trust meets software security

Without adequate software security, from voter registration through the certification of results, electoral trust can be called into question.

Continue Reading...

Posted in Application Security

 

Physician hackers: Healthcare security is in critical condition

FUD—fear, uncertainty, and doubt—is usually met with relentless mockery in the cyber security world, since it’s sometimes used to try to frighten people into buying a product.

Continue Reading...

Posted in Healthcare Security & Privacy, Medical Device Security

 

Behavioral security at RSA Conference 2018

Wednesday, RSA 2018: On any given day, there are more than 150 sessions to choose from here. Good luck getting to even 5% of those. The good news is that attendees can get access to most of the sessions they missed after the fact, since the slide presentations are posted and videos are made of just about every one. So you can keep “attending” for months to come. But from a small slice of it in real time: It didn’t get nearly as much buzz as the keynote from Monica Lewinsky of Bill-Clinton-and-blue-dress fame, but the message was still powerful: Behavioral analytics is changing the world of security.

Continue Reading...

Posted in Automotive Cyber Security, Medical Device Security