Best ways to incorporate security into the software development life cycle

With the persistence of security issues in software development, there is an urgent need for software development companies to prioritize security in the software development life cycle.
The post Best ways to incorporate security into the software deve… Continue reading Best ways to incorporate security into the software development life cycle

How to interpret "Verify the use of a secure software development lifecycle that addresses security in all stages of development"?

I’ve been looking at OWASP Application Security Verification Standard 4.0.2 for a while now, and I’m trying to understand all the checkpoints in detail.
I am not sure what exactly the author of a particular point meant. Therefore, I have a… Continue reading How to interpret "Verify the use of a secure software development lifecycle that addresses security in all stages of development"?

Why Do I Need a Binary Repository Manager?

This is an excerpt from Out of the Wild: A Beginner’s Guide to Package and Dependency Management, a Sonatype Guide. This is the final installment. (Read part one and part two.)
So, why do I need a Binary Repository Manager?
Binary repository manag… Continue reading Why Do I Need a Binary Repository Manager?

Building an Architecture for a Strong Cybersecurity Posture

Is architecture an old-school thought in cybersecurity at a time when DevOps, SRE and agile development methodologies are pushing an organization through rapid transformation? A mandate to follow a standard architecture can slow down project delivery … Continue reading Building an Architecture for a Strong Cybersecurity Posture