Maximize the Power of Your Open Source Application Security Testing

To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products.

The post Maximize the Power of Your Open Source Application Security Testing appeared first on Security Intelligence.

Continue reading Maximize the Power of Your Open Source Application Security Testing

How to Prioritize Security Vulnerabilities in SecDevOps

What’s the first step toward prioritizing security vulnerabilities? Know which open source components developers use in their code and monitor them for alerts using SAST tools.

The post How to Prioritize Security Vulnerabilities in SecDevOps appeared first on Security Intelligence.

Continue reading How to Prioritize Security Vulnerabilities in SecDevOps

Are You Compliant with NIST 800-171?

In June 2015, the U.S. National Institute of Standards and Technology (NIST) released its latest set of guidelines for the handling of Controlled Unclassified Information (CUI), comprising data including personally identifiable information (PII), bank… Continue reading Are You Compliant with NIST 800-171?