Ask the Experts: What will be the biggest cyber security story in 2020?

We asked some experts for their 2020 cyber security predictions. They told us to look out for ransomware, election security, 5G, IoT, regulations, and more.
The post Ask the Experts: What will be the biggest cyber security story in 2020? appeared firs… Continue reading Ask the Experts: What will be the biggest cyber security story in 2020?

[Webinar] Mobile application hardening for business-critical apps

Mobile apps often protect themselves via internally developed controls and commercial products. Learn about how some controls work and how to sidestep them.
The post [Webinar] Mobile application hardening for business-critical apps appeared first on S… Continue reading [Webinar] Mobile application hardening for business-critical apps

Ask the Experts: What are the biggest cyber security threats for 2020?

What are the biggest cyber security threats in 2020? We asked some experts, who warned us about insider threats, disinformation, privacy, IoT, 5G, and more.
The post Ask the Experts: What are the biggest cyber security threats for 2020? appeared first… Continue reading Ask the Experts: What are the biggest cyber security threats for 2020?

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.
The post [Webinars] Container security, tool misuse and abuse, open source in M&A appeared … Continue reading [Webinars] Container security, tool misuse and abuse, open source in M&A

[Webinar] Static Analysis Security Testing (SAST) in CI/CD: Why and How

Learn how to add static application security testing (SAST) to your CI/CD workflows to constantly verify code changes and improve application integrity.
The post [Webinar] Static Analysis Security Testing (SAST) in CI/CD: Why and How appeared first on… Continue reading [Webinar] Static Analysis Security Testing (SAST) in CI/CD: Why and How

SAST vs. SCA: What’s the difference? Do I need both?

Learn how to combine static application security testing (SAST) and software composition analysis (SCA) to strengthen your software security program.
The post SAST vs. SCA: What’s the difference? Do I need both? appeared first on Software Integr… Continue reading SAST vs. SCA: What’s the difference? Do I need both?

[Webinar] OWASP Top 10 for JavaScript Developers

The OWASP documentation doesn’t give much attention to JavaScript. This webinar explains the OWASP Top 10 in terms of JavaScript vulnerabilities.
The post [Webinar] OWASP Top 10 for JavaScript Developers appeared first on Software Integrity Blog… Continue reading [Webinar] OWASP Top 10 for JavaScript Developers

Ask the Experts: How has software security improved in the last few years?

For Thanksgiving, let’s talk about what we’re thankful for: the trends, processes, and technologies that have had a positive impact on software security.
The post Ask the Experts: How has software security improved in the last few years? a… Continue reading Ask the Experts: How has software security improved in the last few years?