Best practices for secure application development

Best practices for secure application development

| | General
Application security is your best defense against the hackers who want your organization’s data. Here are best practices for secure application development. The post Best practices for secure application development appeared first on Software Integrity Blog ... Read More
How to choose application security vendors and tools

How to choose application security vendors and tools

Unless you build your own AppSec tools, you need to know how to choose an application security vendor and whether to opt for individual tools or a suite. The post How to choose application security vendors and tools appeared first on Software Integrity Blog ... Read More
Synopsys CSO Deirdre Hanford champions Cybersecurity Awareness Month

Synopsys CSO Deirdre Hanford champions Cybersecurity Awareness Month

We kick off Cybersecurity Awareness Month with an interview with Deirdre Hanford, CSO at Synopsys, about personal accountability and cyber security. The post Synopsys CSO Deirdre Hanford champions Cybersecurity Awareness Month appeared first on Software Integrity Blog ... Read More
Hackers needed to defeat hackers

Hackers needed to defeat hackers

| | General
What are ethical hackers, and why do we need them? Ethical hacking allows you to see how your systems might be breached, but it goes far beyond pen testing. The post Hackers needed to defeat hackers appeared first on Software Integrity Blog ... Read More
The False Claims Act: 156 years old and newly relevant to software security

The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come? The post The False Claims Act: 156 years old and newly relevant to software security appeared first on Software Integrity Blog ... Read More
Awash in regulations, companies struggle with compliance

Awash in regulations, companies struggle with compliance

| | Quality & Compliance
The list of regulatory compliance challenges facing companies grows longer every time a new regulation is introduced. But do security regulations even work? The post Awash in regulations, companies struggle with compliance appeared first on Software Integrity Blog ... Read More
Software quality: It can be a matter of life and death

Software quality: It can be a matter of life and death

| | Quality & Compliance
Safety-critical software powers everything from airplanes to power plants, defib machines, and seatbelts. And quality issues can lead to injury and death. The post Software quality: It can be a matter of life and death appeared first on Software Integrity Blog ... Read More
Apple’s $1 million bug bounty could launch arms race for zero-days

Apple’s $1 million bug bounty could launch arms race for zero-days

| | General
Experts have given kudos to Apple for expanding its bug bounty program to all researchers. But is the $1 million top prize enough to turn black hats white? The post Apple’s $1 million bug bounty could launch arms race for zero-days appeared first on Software Integrity Blog ... Read More
Synopsys adds more awards to its 2019 winning streak

Synopsys adds more awards to its 2019 winning streak

Seeker IAST won a Gold International Stevie Award for DevOps Solution, and our Polaris platform won for Software Development Solution. The post Synopsys adds more awards to its 2019 winning streak appeared first on Software Integrity Blog ... Read More
Mobile apps: Insecure by default

Mobile apps: Insecure by default

There’s a lack of robust mobile app security on billions of devices people carry around. Why is it such a problem, and what can developers do to solve it? The post Mobile apps: Insecure by default appeared first on Software Integrity Blog ... Read More