Software Compliance, Quality & Standards
MITRE releases 2020 CWE Top 25 most dangerous software weaknesses
Learn how this year’s CWE Top 25 list of the most dangerous software weaknesses can be used to set priorities in your application security. The post MITRE releases 2020 CWE Top 25 ...
How to get compliance audit training in the new virtual workplace
Compliance training will help you pass an audit, but to secure your customer data, your teams need virtual security training beyond compliance requirements. The post How to get compliance audit training in ...
[Webinars] CI/CD security testing, shift left, code quality in M&A
Learn about application security testing in CI/CD pipelines, how to scale responsiveness with a secure SDLC, and why software quality matters in tech M&A. The post [Webinars] CI/CD security testing, shift left, ...
3 ways to boost your security with role-based security compliance training
Minimum compliance with security standards allows you to run the race, but to win against attackers, you’ll need role-based security compliance training. The post 3 ways to boost your security with role-based ...
Want to comply with privacy laws? Start with security
How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach. The post Want to comply with ...
Privacy still eroding on National Data Privacy Day
On National Data Privacy Day, we find little has changed in what numerous privacy advocates and experts have called “the golden age of surveillance.” The post Privacy still eroding on National Data ...
Why is U.S. infrastructure vulnerable? Its software is vulnerable
We know that cyber attacks can have physical consequences. How does U.S. critical infrastructure fare in terms of cyber security and resilience to attack? The post Why is U.S. infrastructure vulnerable? Its ...
[Webinar] OWASP Top 10 for JavaScript Developers
The OWASP documentation doesn’t give much attention to JavaScript. This webinar explains the OWASP Top 10 in terms of JavaScript vulnerabilities. The post [Webinar] OWASP Top 10 for JavaScript Developers appeared first ...
Open source for lawyers: Costs of open source use
Open source might be free, but it’s not risk-free. Let’s examine the potential legal cost of open source use associated with license noncompliance. The post Open source for lawyers: Costs of open ...
Ask the Experts: How has software security improved in the last few years?
For Thanksgiving, let’s talk about what we’re thankful for: the trends, processes, and technologies that have had a positive impact on software security. The post Ask the Experts: How has software security ...

