Trained developers get rid of more vulnerabilities than code scanning tools

An EMA survey of 129 software development professionals uncovered that for those using code scanning tools, only 10% of organizations prevented a higher percentage of vulnerabilities than organizations not using code scanning tools, while continuous tr… Continue reading Trained developers get rid of more vulnerabilities than code scanning tools

How to improve secure coding education

Did you know that not one of the top 50 undergraduate computer science programs in the U.S. requires a course in code or application security for majors? Yet the threatscape is only expanding. A recent report by Security Journey reveals the gap left by… Continue reading How to improve secure coding education

What developers want and how to keep them on your team

OutSystems released a new developer jobs report identifying the factors that motivate them to stay with their companies and the frustrations that drive them away. The report, Developer Engagement Report: Are Your Developers Happy or Halfway Out The Doo… Continue reading What developers want and how to keep them on your team

Simplifying legal entity identification in the digital age

As the world’s legal entities rush to digitize their processes and transactions, confidence in digital authenticity is in short supply. Thankfully, a single, open and universal protocol that will enable legal entities everywhere to verify the authentic… Continue reading Simplifying legal entity identification in the digital age

Barely one-third of IT pros can vet code for tampering

Global research commissioned by ReversingLabs and conducted by Dimensional Research, revealed that software development teams are increasingly concerned about supply chain attacks and tampering, but barely a third said they can effectively vet the secu… Continue reading Barely one-third of IT pros can vet code for tampering

Massive shadow code risk for world’s largest businesses

Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply chains of major business websites. This risk, originating from highly dynamic … Continue reading Massive shadow code risk for world’s largest businesses

Sigstore: Signature verification for protection against supply chain attacks

Software supply chain attacks have been increasing over the past few years, spurring the Biden administration to release an executive order detailing what government agencies are supposed to do to protect themselves against them. These attacks consist … Continue reading Sigstore: Signature verification for protection against supply chain attacks