How to keep your CI/CD pipeline secure with a remote workforce

How to keep your CI/CD pipeline secure with a remote workforce

How do you secure the work of your development team when they’re off your network, working from home? Here are some tips to keep your CI/CD pipeline secure. The post How to keep your CI/CD pipeline secure with a remote workforce appeared first on Software Integrity Blog ... Read More
How 5G and IoT devices open up the attack surface on enterprises

How 5G and IoT devices open up the attack surface on enterprises

As 5G standards continue to evolve, what steps can development organizations take now to improve the security of billions of 5G and IoT devices and systems? The post How 5G and IoT devices open up the attack surface on enterprises appeared first on Software Integrity Blog ... Read More
How does IAST fit into DevSecOps?

How does IAST fit into DevSecOps?

IAST, a new generation of application security testing that bridges the gaps between SAST, DAST, and pen testing, seems to have been made for DevSecOps. The post How does IAST fit into DevSecOps? appeared first on Software Integrity Blog ... Read More
3 steps to reduce your API and web service risk in M&A due diligence

3 steps to reduce your API and web service risk in M&A due diligence

| | Mergers & Acquisitions
Learn more about the risk areas related to APIs and web services during due diligence in M&A transactions involving software, and how to reduce each risk. The post 3 steps to reduce your API and web service risk in M&A due diligence appeared first on Software Integrity Blog ... Read More
Behshad Rejai on the past, present, and future of software development

Behshad Rejai on the past, present, and future of software development

With 36 years of experience, Behshad Rejai, VP of engineering in the Software Integrity Group, shares her views of the future of software development. The post Behshad Rejai on the past, present, and future of software development appeared first on Software Integrity Blog ... Read More
How DevOps security tools support modern applications

How DevOps security tools support modern applications

Modern application development organizations must integrate and automate DevOps security tools such as IAST into CI/CD pipelines to speed developers. The post How DevOps security tools support modern applications appeared first on Software Integrity Blog ... Read More
What are the different types of security vulnerabilities?

What are the different types of security vulnerabilities?

An application security vulnerability is a security bug, flaw, error, fault, hole, or weakness in software architecture, design, code, or implementation that can be exploited by attackers. Let’s take a closer look at the different types of security vulnerabilities. The post What are the different types of security vulnerabilities? appeared ... Read More
Top 3 cloud security trends for 2019

Top 3 cloud security trends for 2019

A new report covers the top cloud security trends for 2019, including cloud security concerns, cloud compliance challenges, and barriers to cloud adoption. The post Top 3 cloud security trends for 2019 appeared first on Software Integrity Blog ... Read More
What happens when your CISO has one of those days?

What happens when your CISO has one of those days?

A CISO having a bad day finds out the hard way that cutting corners on software security testing might end up costing him more than he saved. The post What happens when your CISO has one of those days? appeared first on Software Integrity Blog ... Read More
Technology company M&A: Do due diligence on SDLC process/tools

Technology company M&A: Do due diligence on SDLC process/tools

Technical due diligence on the target’s SDLC is a must for acquirers in software M&A. What you don’t know about their process and tools could hurt you. The post Technology company M&A: Do due diligence on SDLC process/tools appeared first on Software Integrity Blog ... Read More