[Webinars] Open source security, remote security testing, secure development

Learn more about the 2020 OSSRA report, guidelines and solutions for remote security testing, and why all software development should be secure development.
The post [Webinars] Open source security, remote security testing, secure development appeared… Continue reading [Webinars] Open source security, remote security testing, secure development

Maintaining your AppSec program through office closures and economic uncertainty

Here are three ways application security teams can respond to staffing challenges and increased security risks today while strengthening their AppSec program for the future.
The post Maintaining your AppSec program through office closures and economic… Continue reading Maintaining your AppSec program through office closures and economic uncertainty

[Webinars] Modern application security programs, SAST in DevSecOps

Learn more about modern application security programs, DevOps, and CI/CD, and how to integrate static analysis into your DevSecOps pipeline.
The post [Webinars] Modern application security programs, SAST in DevSecOps appeared first on Software Integri… Continue reading [Webinars] Modern application security programs, SAST in DevSecOps

[Webinar] How Open Source Made Me a Better Manager

Learn about management practices inspired by open source principles, such as allowing the best ideas to guide the team, no matter who brings them up.
The post [Webinar] How Open Source Made Me a Better Manager appeared first on Software Integrity Blog… Continue reading [Webinar] How Open Source Made Me a Better Manager

Want to comply with privacy laws? Start with security

How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach.
The post Want to comply with privacy laws? Start with security appeared first on Software … Continue reading Want to comply with privacy laws? Start with security

How to Cyber Security: A journey of a thousand miles

If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower.
The post How to Cyber Security: A journey of a thousand miles appeared first on Software… Continue reading How to Cyber Security: A journey of a thousand miles

Report: Cyber threats growing, but security responses aren’t keeping pace

A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap.
The post Report: Cyber threats growing, but security responses aren’t keeping pace a… Continue reading Report: Cyber threats growing, but security responses aren’t keeping pace

How to Cyber Security: Software is critical infrastructure

Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment.
The post How to Cyber Security: Software is critical infrastructure appeared first on Software … Continue reading How to Cyber Security: Software is critical infrastructure

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source.
The post [Webinars] Container security, tool misuse and abuse, open source in M&A appeared … Continue reading [Webinars] Container security, tool misuse and abuse, open source in M&A

How to Cyber Security: Unicorns and donkeys

A security group should help lift the organization into a positive, proactive attitude and work security into all aspects of development and operations.
The post How to Cyber Security: Unicorns and donkeys appeared first on Software Integrity Blog.
T… Continue reading How to Cyber Security: Unicorns and donkeys