AppSec Decoded: The consequences of insecure IoT devices
Watch the latest video in our AppSec Decoded series to learn why manufacturers should consider building security into their IoT devices. The post AppSec Decoded: The consequences of insecure IoT devices appeared first on Software Integrity Blog ... Read More
AppSec Decoded: The security dilemma of IoT devices
In honor of National Cybersecurity Awareness Month, we’ve released a new video series that kicks off with a discussion on the future of IoT devices. The post AppSec Decoded: The security dilemma of IoT devices appeared first on Software Integrity Blog ... Read More
Can SAST tools improve developer productivity?
They can—if you have a SAST tool that helps developers find and fix real security defects rather than hindering their productivity with false positives. The post Can SAST tools improve developer productivity? appeared first on Software Integrity Blog ... Read More
Developing a COVID-19 track and trace app — through the lens of Synopsys
The rapidly evolving COVID-19 emergency has set off a global race to trace, and Synopsys offers key considerations for track and trace application development. The post Developing a COVID-19 track and trace app — through the lens of Synopsys appeared first on Software Integrity Blog ... Read More
[Webinars] OpenChain and open source supply chain security
Learn what OpenChain is, how it works, and how companies around the world are using it to secure their software supply chains and reduce open source risk. The post [Webinars] OpenChain and open source supply chain security appeared first on Software Integrity Blog ... Read More
[Webinars] Open source, threat modeling, Node.js security
Hear about the state of open source in our Red Hat partner webinar, discover our approach to threat modeling, and learn how to secure Node.js applications. The post [Webinars] Open source, threat modeling, Node.js security appeared first on Software Integrity Blog ... Read More
Secure SDLC 101
Learn about the phases of a software development life cycle, plus how to build security in or take an existing SDLC to the next level: the secure SDLC. The post Secure SDLC 101 appeared first on Software Integrity Blog ... Read More
[Webinars] Developing track and trace apps, integrating SAST into DevSecOps
Learn about the security considerations for COVID-19 track and trace mobile apps and how to integrate static analysis into your DevSecOps pipeline. The post [Webinars] Developing track and trace apps, integrating SAST into DevSecOps appeared first on Software Integrity Blog ... Read More
How to overcome 4 software security training challenges
If you face any of these four software security training challenges, we have some tips to help you overcome them and get your team the training they need. The post How to overcome 4 software security training challenges appeared first on Software Integrity Blog ... Read More
[Webinars] Binary scanning, software supply chain management
In this week’s webinars, we’ll talk about binary scanning techniques and challenges, and how to reduce your risk with software supply chain management. The post [Webinars] Binary scanning, software supply chain management appeared first on Software Integrity Blog ... Read More

