Tips for working from home without losing your marbles or compromising security

Tips for working from home without losing your marbles or compromising security

Our longtime remote employees have some tips for working from home to keep you sane, and your company’s assets secure, during a strange, stressful time. The post Tips for working from home without losing your marbles or compromising security appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Software is manufacturing

How to Cyber Security: Software is manufacturing

Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials. The post How to Cyber Security: Software is manufacturing appeared first on Software Integrity Blog ... Read More
How to Cyber Security: It’s all about developers, except when it’s not

How to Cyber Security: It’s all about developers, except when it’s not

To get security testing results in front of developers, who are in the best position to address them effectively, you need automation and integration. The post How to Cyber Security: It’s all about developers, except when it’s not appeared first on Software Integrity Blog ... Read More
How to Cyber Security: A journey of a thousand miles

How to Cyber Security: A journey of a thousand miles

If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower. The post How to Cyber Security: A journey of a thousand miles appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Software is critical infrastructure

How to Cyber Security: Software is critical infrastructure

Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment. The post How to Cyber Security: Software is critical infrastructure appeared first on Software Integrity Blog ... Read More
How to Cyber Security: Unicorns and donkeys

How to Cyber Security: Unicorns and donkeys

A security group should help lift the organization into a positive, proactive attitude and work security into all aspects of development and operations. The post How to Cyber Security: Unicorns and donkeys appeared first on Software Integrity Blog ... Read More
Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

This is the second of two articles that describe how to use the Defensics SDK in fuzzing Bitcoin. In the previous article, you saw how to set up a test bed for bitcoind. We created two containers, alice and bob, and were able to set up communication between the two ... Read More
Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first of two articles that describe how to use the Defensics SDK to fuzz Bitcoin software. Specifically, you will learn how to model one of the Bitcoin protocol messages and use the Defensics SDK to perform fuzzing on the bitcoind process. This is an advanced technical tutorial, ... Read More