5 Irrefutable Reasons to Prioritize Software Security

5 Irrefutable Reasons to Prioritize Software Security

These days, technology is evolving at a pace like never before seen, forcing organizations into an “adapt or die” situation. And, as digital transformation accelerates, everyone is feeling the effects. DevOps leaders, ...
What the Building In Security Maturity Model (BSIMM) Says About the Role of SAST and SCA

What the Building In Security Maturity Model (BSIMM) Says About the Role of SAST and SCA

The BSIMM is an annual study of the real-world software security initiatives – “SSIs” in the report - across the software industry drawing from data and experience from 130 organizations. Rather than ...
It’s Time to Update Your Drupal Now!

It’s Time to Update Your Drupal Now!

As part of our ongoing mission to help organizations develop and deploy more secure software and applications, and in light of Checkmarx’s expanded insight into the open source security landscape with its ...

Strong Customer Authentication: How Will it Affect Merchants?

While it?s tempting for merchants to view SCA requirements as inconvenient, the new requirements is an opportunity to transform the online shopping experience. Merchants that adopt 3D Secure 2.0 will now be ...
The Road to DevSecOps: Addressing the Challenges of Open Source Software

The Road to DevSecOps: Addressing the Challenges of Open Source Software

Although software is significantly changing our work, home, and personal lives, many don’t realize that today’s software is made up of numerous ingredients. Some of the software we use daily contains pieces ...
UPDATE: 21 SaltStack Breaches with 2900 Still Vulnerable

UPDATE: 21 SaltStack Breaches with 2900 Still Vulnerable

| | AppSec, SBOM, SCA
UPDATE for May 31, 2020: We first published this story over a week ago, but adversaries don't rest. On Friday, Cisco announced that they have discovered SaltStack compromises on six of their ...

Tanya Janca is “Big Fan of SCA” [VIDEO]

Tanya Janca, also known as SheHacksPurple, sat down with me on this episode of DevSecOps: The Good, The Bad, and The Ugly. Her new company teaches application security, DevSecOps, and cloud security ...

Real Talk: What Users Really Look For in a Software Composition Analysis (SCA) Solution

A few weeks ago, we wrote about the differences in SCA and SAST tools. While you can’t really compare the two, for most organizations, software composition analysis (SCA) is likely the best ...
Kudos to the Unsung Heroes in our Current Times: Software Developers

Kudos to the Unsung Heroes in our Current Times: Software Developers

As the world duly salutes our front-line medical professionals, first responders, military and police, factory workers, delivery drivers, construction teams, repair technicians, store clerks, farmers, truckers, pharmacists, cooks, and millions of other ...

Are PSD2 SCA Options Too Narrow in Scope?

On September 14th, new PSD2 requirements known as Strong Customer Authentication (SCA) were introduced across Europe. These requirements are part of the EU Revised Directive on Payment Services (PSD2) and are intended ...