MITRE releases 2020 CWE Top 25 most dangerous software weaknesses

MITRE releases 2020 CWE Top 25 most dangerous software weaknesses

Learn how this year’s CWE Top 25 list of the most dangerous software weaknesses can be used to set priorities in your application security. The post MITRE releases 2020 CWE Top 25 ...
How to get compliance audit training in the new virtual workplace

How to get compliance audit training in the new virtual workplace

Compliance training will help you pass an audit, but to secure your customer data, your teams need virtual security training beyond compliance requirements. The post How to get compliance audit training in ...
[Webinars] CI/CD security testing, shift left, code quality in M&A

[Webinars] CI/CD security testing, shift left, code quality in M&A

Learn about application security testing in CI/CD pipelines, how to scale responsiveness with a secure SDLC, and why software quality matters in tech M&A. The post [Webinars] CI/CD security testing, shift left, ...
3 ways to boost your security with role-based security compliance training

3 ways to boost your security with role-based security compliance training

Minimum compliance with security standards allows you to run the race, but to win against attackers, you’ll need role-based security compliance training. The post 3 ways to boost your security with role-based ...
Want to comply with privacy laws? Start with security

Want to comply with privacy laws? Start with security

How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach. The post Want to comply with ...
Privacy still eroding on National Data Privacy Day

Privacy still eroding on National Data Privacy Day

On National Data Privacy Day, we find little has changed in what numerous privacy advocates and experts have called “the golden age of surveillance.” The post Privacy still eroding on National Data ...
Why is U.S. infrastructure vulnerable? Its software is vulnerable

Why is U.S. infrastructure vulnerable? Its software is vulnerable

We know that cyber attacks can have physical consequences. How does U.S. critical infrastructure fare in terms of cyber security and resilience to attack? The post Why is U.S. infrastructure vulnerable? Its ...
[Webinar] OWASP Top 10 for JavaScript Developers

[Webinar] OWASP Top 10 for JavaScript Developers

The OWASP documentation doesn’t give much attention to JavaScript. This webinar explains the OWASP Top 10 in terms of JavaScript vulnerabilities. The post [Webinar] OWASP Top 10 for JavaScript Developers appeared first ...
Open source for lawyers: Costs of open source use

Open source for lawyers: Costs of open source use

Open source might be free, but it’s not risk-free. Let’s examine the potential legal cost of open source use associated with license noncompliance. The post Open source for lawyers: Costs of open ...
Ask the Experts: How has software security improved in the last few years?

Ask the Experts: How has software security improved in the last few years?

For Thanksgiving, let’s talk about what we’re thankful for: the trends, processes, and technologies that have had a positive impact on software security. The post Ask the Experts: How has software security ...