How to build a process around an application security tool

How to build a process around an application security tool

| | Maturity Model (BSIMM)
How do you ensure your application security tools are enablers rather than hurdles? By building application security processes around the tools you deploy. The post How to build a process around an ...
Ask the Experts: How can software engineers support security efforts?

Ask the Experts: How can software engineers support security efforts?

We’ve gathered some expert opinions about how software engineers can contribute to, improve, and even lead their organization’s software security program. The post Ask the Experts: How can software engineers support security ...
[Webinars] NVD data feed alternatives and software security metrics

[Webinars] NVD data feed alternatives and software security metrics

Learn about a better, faster alternative to NVD vulnerability data feeds and how to measure software security effectiveness and use metrics to drive change. The post [Webinars] NVD data feed alternatives and ...
How proactive is your software security initiative?

How proactive is your software security initiative?

| | Maturity Model (BSIMM)
A proactive software security initiative protects your organization. Does your software security measure up? Take our 12-question quiz to find out. The post How proactive is your software security initiative? appeared first ...
BSIMM10: A decade of research on software security activities

BSIMM10: A decade of research on software security activities

BSIMM10 compiles a decade of research on software security activities in real-life firms into a guide for maturing your software security initiative. The post BSIMM10: A decade of research on software security ...
[Infographic] BSIMM10 by the numbers

[Infographic] BSIMM10 by the numbers

How many BSIMM participants have a software security group? How many think it’s key to their success? How many people are in the average SSG? Get the facts. The post [Infographic] BSIMM10 ...
Software security program checklist: Kick off your program with a bang

Software security program checklist: Kick off your program with a bang

| | Maturity Model (BSIMM)
If you want to enjoy your Sunday kickoffs, our software security program checklist of five activities will help you kick off your program successfully. The post Software security program checklist: Kick off ...
Securing software development: NIST joins the parade

Securing software development: NIST joins the parade

The NIST Secure Software Development Framework (SSDF) is the latest standard aimed at improving software security. Can its novel approach help it succeed? The post Securing software development: NIST joins the parade ...
What happens when your CISO has one of those days?

What happens when your CISO has one of those days?

A CISO having a bad day finds out the hard way that cutting corners on software security testing might end up costing him more than he saved. The post What happens when ...
More medical mega-breaches thanks to third-party insecurity

More medical mega-breaches thanks to third-party insecurity

The AMCA breach hammers home the need for supply chain security. Here’s how to vet your vendors so you can keep from becoming the next Quest or LabCorp. The post More medical ...