From Waterfall to SecDevOps: The Evolution of Security Philosophy

Unlike the waterfall and agile approaches to development, SecDevOps requires security to be built into projects from the outset, not bolted on afterward.

The post From Waterfall to SecDevOps: The Evolution of Security Philosophy appeared first on Security Intelligence.

Continue reading From Waterfall to SecDevOps: The Evolution of Security Philosophy

Slow and Steady Wins the Application Security Testing Race

The Tortoise and the Hare are challenged to develop an app, and the winner must consider both application security and functionality. Who will prevail?

The post Slow and Steady Wins the Application Security Testing Race appeared first on Security Intelligence.

Continue reading Slow and Steady Wins the Application Security Testing Race

SecDevOps: Putting Security at the Heart of DevOps

A SecDevOps cycle can help companies accelerate the development process, reduce code vulnerabilities and bridge the gap between agility and security.

The post SecDevOps: Putting Security at the Heart of DevOps appeared first on Security Intelligence.

Continue reading SecDevOps: Putting Security at the Heart of DevOps

How Not to Store Passwords: SHA-1 Fails Again

Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.

The post How Not to Store Passwords: SHA-1 Fails Again appeared first on Security Intelligence.

Continue reading How Not to Store Passwords: SHA-1 Fails Again

Five Key IT Security Best Practices to Safeguard Your Expanding Business

Owners of small and medium-sized businesses (SMBs) should follow these IT security best practices to protect their data and gain a competitive advantage.

The post Five Key IT Security Best Practices to Safeguard Your Expanding Business appeared first on Security Intelligence.

Continue reading Five Key IT Security Best Practices to Safeguard Your Expanding Business

Don’t Sweep Web Application Penetration Testing Under the Rug

Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.

The post Don’t Sweep Web Application Penetration Testing Under the Rug appeared first on Security Intelligence.

Continue reading Don’t Sweep Web Application Penetration Testing Under the Rug

Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code

There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.

The post Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code appeared first on Security Intelligence.

Continue reading Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code

Integrating the IoT Into Your Application Security Program

Is your network prepared to handle the IoT? Start by focusing on your application security program, since many IoT threats lurk in the application layer.

The post Integrating the IoT Into Your Application Security Program appeared first on Security Intelligence.

Continue reading Integrating the IoT Into Your Application Security Program

Integrating the IoT Into Your Application Security Program

Is your network prepared to handle the IoT? Start by focusing on your application security program, since many IoT threats lurk in the application layer.

The post Integrating the IoT Into Your Application Security Program appeared first on Security Intelligence.

Continue reading Integrating the IoT Into Your Application Security Program

In Case You Missed the Memo: What’s New in IBM’s Application Security Testing?

New enhancements to IBM’s application security testing solutions enable clients to simplify SAST, remediate open source vulnerabilities and more.

The post In Case You Missed the Memo: What’s New in IBM’s Application Security Testing? appeared first on Security Intelligence.

Continue reading In Case You Missed the Memo: What’s New in IBM’s Application Security Testing?