Your 2019 Essential Software Security, Development, & DevOps Conferences

Your 2019 Essential Software Security, Development, & DevOps Conferences

“DevOps” encompasses a wide range of topics – throw security in there and you’ve added even more. This roundup includes events throughout the year and around the globe, from small events to community conferences and up. Whether you’re passionate about software security, ethical hacking, software development, cloud security, or DevOps, ... Read More
Creating A fake Google Mail Sign in Template

Don’t Get Phished – 7 Tips to Avoid This Common Cyber Attack

Phishing is the most common type of cyber-attack that impacts organizations both large and small. These attacks may take many forms, but they all share a common goal – getting you to share sensitive information such as login credentials, credit card information, or bank account details. Unfortunately, some of the ... Read More
Managing Software Security: 10 Essential Best Practices [Infographic]

Managing Software Security: 10 Essential Best Practices [Infographic]

Is your software security program up to the challenges of a rapidly accelerating software delivery environment? Most aren’t – and it’s challenging to both identify the problems and determine the best ways to manage software security in a DevOps environment. Learn some of the essential best practices for managing software ... Read More
A Practical Way to Use NFC Data to Exfiltrate Data

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one network can have from another, other than actually turning off the device. Typically, military or governmental computer systems, ... Read More
Cardiac patient data at risk, Philips reports

Cardiac patient data at risk, Philips reports

It’s never good news to find out that both your personal and clinical information could be compromised by the software platform your healthcare provider is using. But it’s at least somewhat better news to know that the company responsible for the vulnerable software has been transparent about it, notifying the ... Read More
Medical devices still hackable, researchers say

Medical devices still hackable, researchers say

Security researchers Jonathan Butts and Billy Rios wanted to make it clear at the beginning of their presentation. “The benefits of implanted medical devices outweigh the risks (for most people),” read one of their opening slides. But they probably wouldn’t have been doing a session at Black Hat titled “Understanding ... Read More
Half a billion IoT devices vulnerable, breaches at Homeland Security, FedEx, and the fastest growing cyberthreat

Half a billion IoT devices vulnerable, breaches at Homeland Security, FedEx, and the fastest growing cyberthreat

Software Integrity Insight is switching over to a monthly schedule, but we’ll still bring you the best SAST, DAST, and SCA security news as we find it. And don’t despair: You can still get your weekly fix of application security (and insecurity) news by following our colleague Taylor Armerding’s video ... Read More
Infosecurity Europe highlights InfoSec concerns in Europe today

Infosecurity Europe highlights InfoSec concerns in Europe today

At Infosecurity Europe in June, we surveyed 275 attendees who visited our booth to get the pulse of InfoSec concerns in Europe today. We were delighted to learn that 90% of their organizations had a formal application security process in place, using a dedicated internal application security team or initiative, ... Read More

Secure Guardrails