How to cyber security: Pain in the *AST

How to cyber security: Pain in the *AST

What’s the difference between IT security and application security? And what do all those acronyms mean? Learn more in our quick cyber security primer. The post How to cyber security: Pain in the *AST appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Fuzz a tank

How to Cyber Security: Fuzz a tank

With the Defensics SDK, you can create fuzzing test suites for any type of data. In this article, we demonstrate how to start modeling a custom protocol. The post How to Cyber Security: Fuzz a tank appeared first on Software Integrity Blog ... Read More
Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent

Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent

| | Fuzz Testing
By helping your fuzzer detect failure better with agent instrumentation, you can maximize the value of fuzz testing in your secure development life cycle. The post Find more bugs by detecting failure better: An introduction to SanitizerProcessMonitorAgent appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Software testing is cool

How to Cyber Security: Software testing is cool

Software security testing involves knocking down walls, scaling fences, and otherwise breaking applications to generate helpful feedback for development. The post How to Cyber Security: Software testing is cool appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Fuzzing does not mean random

How to Cyber Security: Fuzzing does not mean random

| | Fuzz Testing
The most efficient fuzzing happens not with random test cases but with targeted test cases generated from detailed data models and a powerful anomalizer. The post How to Cyber Security: Fuzzing does not mean random appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Application security is critical for data security

How to Cyber Security: Application security is critical for data security

Data protection requires application security. Threat modeling and vulnerability management help you secure your apps from development through production. The post How to Cyber Security: Application security is critical for data security appeared first on Software Integrity Blog ... Read More
Tips for working from home without losing your marbles or compromising security

Tips for working from home without losing your marbles or compromising security

Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time. The post Tips for working from home without losing your marbles or compromising security appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Software is manufacturing

How to Cyber Security: Software is manufacturing

Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials. The post How to Cyber Security: Software is manufacturing appeared first on Software Integrity Blog ... Read More
How to Cyber Security: It’s all about developers, except when it’s not

How to Cyber Security: It’s all about developers, except when it’s not

To get security testing results in front of developers, who are in the best position to address them effectively, you need automation and integration. The post How to Cyber Security: It’s all about developers, except when it’s not appeared first on Software Integrity Blog ... Read More
How to Cyber Security: A journey of a thousand miles

How to Cyber Security: A journey of a thousand miles

If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower. The post How to Cyber Security: A journey of a thousand miles appeared first on Software Integrity Blog ... Read More