Software Integrity Blog

Search Results for 'government security'


GAO report confirms major gaps in government cybersecurity

The September GAO cybersecurity report stated that there are about 1,000 outstanding recommendations for automotive, military, and IoT security, among others.

Continue Reading...

Posted in Automotive Cyber Security, IoT Security


Security lessons from the House Oversight and Government Reform Committee

The U.S. House Committee on Oversight and Government Reform has more than a few things to say about responsible enterprise application security.

Continue Reading...

Posted in Data Breach Security, Open Source Security


Ask the Experts: What are the biggest cyber security threats for 2020?

What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.

Continue Reading...

Posted in Application Security, Data Breach Security, Featured


Vandana Verma: Passionate guide for the web application security journey

Vandana Verma, security architect at IBM India Software Labs and web application security expert, shares her advice on tools, training, and shifting left.

Continue Reading...

Posted in Featured, Web Application Security


The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come?

Continue Reading...

Posted in Software Compliance, Quality & Standards


Ask the Experts: What’s the top cloud migration security risk?

We’ve gathered some expert opinions about the top cloud migration security risks that organizations should think about when moving to the cloud.

Continue Reading...

Posted in Cloud Security


Your application security testing tool just got acquired. Now what?

A cyber security acquisition can be a great deal for investors, but what about users? Here’s what to do if your application security tool has been acquired.

Continue Reading...

Posted in Interactive Application Security Testing (IAST)


More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp.

Continue Reading...

Posted in Data Breach Security, Healthcare Security & Privacy, Software Security Program


The cybersecurity workforce executive order: Real potential or wishful thinking?

The cybersecurity executive order of 2019 is meant to boost cyber security skills and improve national defense against growing cyber threats. Will it work?

Continue Reading...

Posted in Security Training & Awareness


Tips for recruiting top cyber security talent (and mistakes to avoid)

The cyber security job market is hot, and common recruiting mistakes can keep new talent away. Here are some do’s and don’ts for cyber security recruiting.

Continue Reading...

Posted in Security Training & Awareness