Quantifying software quality risks in tech M&A

Quantifying software quality risks in tech M&A

Tech M&A typically evaluates security and legal risks, but what about software quality risks? Poor code and architecture quality can have a lasting impact. The post Quantifying software quality risks in tech ...
What happens when your CISO has one of those days?

What happens when your CISO has one of those days?

A CISO having a bad day finds out the hard way that cutting corners on software security testing might end up costing him more than he saved. The post What happens when ...
The Verizon DBIR and the art of the breach

The Verizon DBIR and the art of the breach

An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights. The post The Verizon DBIR and the ...
Want to secure your apps? Build security in with the right toolchain

Want to secure your apps? Build security in with the right toolchain

Having the right application security toolchain is the most effective way to build security in, which is critical to securing modern apps against attacks. Is it worth making more than a minimal ...
OWASP Top 10 web application security risks

OWASP Top 10 web application security risks

The OWASP Top 10 2017 is a list of the most significant web application security risks. How are you addressing these top 10 web app vulnerabilities? The Open Web Application Security Project ...
Software Security: Mainframes to Connected Cars–Dr. Gary McGraw, VP of Security Technology, Synopsys

From mainframes to connected cars: How software drives the automotive industry

The automotive industry runs on software—but with increased software use comes an increased attack surface. Making safe, reliable vehicles starts with building secure software. Dr. Gary McGraw explains the importance of secure ...