Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019. The post Cost of ...
How the 2019 CWE Top 25 can boost your application security

How the 2019 CWE Top 25 can boost your application security

You can use the 2019 CWE Top 25 to help focus your application security efforts. Learn more about this list of the 25 most dangerous software weaknesses. The post How the 2019 ...
[Webinars] Evidence-based security, design and code quality in tech M&A

[Webinars] Evidence-based security, design and code quality in tech M&A

Learn how to improve software security using evidence-based standards, and why you should inspect design and code quality during technical due diligence. The post [Webinars] Evidence-based security, design and code quality in ...
Coverity release ties in well to the latest MITRE CWE Top 25

Coverity release ties in well to the latest MITRE CWE Top 25

MITRE’s 2019 CWE Top 25 list contains many code quality issues that can result in security vulnerabilities. Static analysis can help you mitigate them. The post Coverity release ties in well to ...
The False Claims Act: 156 years old and newly relevant to software security

The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come? The post The False Claims ...
Is Ireland too soft with GDPR enforcement, or just being prudent?

Is Ireland too soft with GDPR enforcement, or just being prudent?

Some are concerned by the lack of GDPR fines issued by Ireland, the lead regulator for many tech giants. But the country’s taking its time for good reason. The post Is Ireland ...
[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

In our software compliance webinar, Matan Scharf (Synopsys) explains the hidden security dangers of software standardization. Watch May 30 @ 10 a.m. Eastern. The post [Webinar] Security by Obscurity: The Flip-Side of ...
[Infographic] A look back at the first year of GDPR

[Infographic] A look back at the first year of GDPR

The first year of GDPR started slow, but companies and regulators alike are picking up speed. Our new infographic shows GDPR’s first year by the numbers. The post [Infographic] A look back ...
[Webinars] Tech due diligence, IAST, and government software

[Webinars] Tech due diligence, IAST, and government software

Learn about web services and APIs in tech due diligence, the magic of IAST, and software risks for DoD and government agencies in our upcoming webinars. The post [Webinars] Tech due diligence, ...
How to protect sensitive data with PCI DSS compliance

How to protect sensitive data with PCI DSS compliance

PCI DSS compliance can help you protect sensitive data and prevent data breaches. Step 1: Identify sensitive data and track how your applications handle it. The post How to protect sensitive data ...