Jonathan Knudsen, Author at Security Boulevard
How to cyber security: 5G is not magic

How to cyber security: 5G is not magic

| | IoT Security
5G is faster than its predecessor but that doesn’t change the approach to software security for your applications. The post How to cyber security: 5G is not magic appeared first on Software Integrity Blog ... Read More
How to cyber security: Minimize risk and testing time with Intelligent Orchestration

How to cyber security: Minimize risk and testing time with Intelligent Orchestration

Integrating AST tools into your CI/CD pipeline shouldn’t compromise your development velocity. Learn how Intelligent Orchestration can help. The post How to cyber security: Minimize risk and testing time with Intelligent Orchestration appeared first on Software Integrity Blog ... Read More
How to cyber security: Containerizing fuzzing targets

How to cyber security: Containerizing fuzzing targets

| | Application Security
Achieve repeatable, consistent testing results in a controlled environment using containerization with fuzz testing. The post How to cyber security: Containerizing fuzzing targets appeared first on Software Integrity Blog ... Read More
How to cyber security: Faceplanting in 10 lines of code

How to cyber security: Faceplanting in 10 lines of code

Failure to address security early in the software development life cycle can increase business risks. Learn how a proactive, holistic approach helps achieve more-secure software. The post How to cyber security: Faceplanting in 10 lines of code appeared first on Software Integrity Blog ... Read More
How to cyber security: Software security is everyone’s responsibility

How to cyber security: Software security is everyone’s responsibility

The burden of software security often falls solely on security teams, but to be successful, organizations need to make security a team effort. The post How to cyber security: Software security is everyone’s responsibility appeared first on Software Integrity Blog ... Read More
How to cyber security:  Gotta go fast … but why?

How to cyber security: Gotta go fast … but why?

DevSecOps allows organizations to deliver applications at a high velocity using iteration and automation to better serve customers. The post How to cyber security: Gotta go fast … but why? appeared first on Software Integrity Blog ... Read More
New survey shows integrating application security testing gaining traction in DevOps

New survey shows integrating application security testing gaining traction in DevOps

DevOps can break traditional application security testing processes & tools. Learn why an integrated DevSecOps approach is critical to building better code. The post New survey shows integrating application security testing gaining traction in DevOps appeared first on Software Integrity Blog ... Read More
How To Cyber Security:  Put the Sec in DevOps with Intelligent Orchestration

How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration

DevSecOps is a team effort. Learn how to build security into DevOps to deliver secure, high-quality software faster using SAST and SCA software solutions. The post How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration appeared first on Software Integrity Blog ... Read More
How to cyber security: Pain in the *AST

How to cyber security: Pain in the *AST

What’s the difference between IT security and application security? And what do all those acronyms mean? Learn more in our quick cyber security primer. The post How to cyber security: Pain in the *AST appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Fuzz a tank

How to Cyber Security: Fuzz a tank

With the Defensics SDK, you can create fuzzing test suites for any type of data. In this article, we demonstrate how to start modeling a custom protocol. The post How to Cyber Security: Fuzz a tank appeared first on Software Integrity Blog ... Read More
Loading...