Want to comply with privacy laws? Start with security

Want to comply with privacy laws? Start with security

How do you comply with privacy laws that haven’t even been enacted yet? Start by securing your software and systems against cyber attacks and data breach. The post Want to comply with ...
How to Cyber Security: A journey of a thousand miles

How to Cyber Security: A journey of a thousand miles

If you keep taking small steps toward cyber security, even if it seems nothing is happening, you’ll eventually get to a state where your risk is much lower. The post How to ...
Report: Cyber threats growing, but security responses aren’t keeping pace

Report: Cyber threats growing, but security responses aren’t keeping pace

A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap. The post Report: Cyber threats ...
How to Cyber Security: Software is critical infrastructure

How to Cyber Security: Software is critical infrastructure

Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment. The post How to Cyber Security: Software is critical infrastructure appeared ...
[Webinars] Container security, tool misuse and abuse, open source in M&A

[Webinars] Container security, tool misuse and abuse, open source in M&A

Learn how containerization changes the security paradigm, how to prevent security tool misuse, and what M&A participants should know about open source. The post [Webinars] Container security, tool misuse and abuse, open ...
5 lessons learned from the BSIMM

5 lessons learned from the BSIMM

Here are 5 lessons we’ve learned from 10 years of the BSIMM: There are no special snowflakes, but your firm is unique. People are essential, but they can’t do everything. And pen ...
How to Cyber Security: Unicorns and donkeys

How to Cyber Security: Unicorns and donkeys

A security group should help lift the organization into a positive, proactive attitude and work security into all aspects of development and operations. The post How to Cyber Security: Unicorns and donkeys ...
[Infographic] 7 truths to improve your software security program

[Infographic] 7 truths to improve your software security program

The Building Security In Maturity Model (BSIMM) can help you improve your software security program, regardless of industry, size, or application mix. The post [Infographic] 7 truths to improve your software security ...
Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

Synopsys CSO: Cybersecurity Awareness Month lessons need to be applied all year

Synopsys CSO Deirdre Hanford discusses what we learned from Cybersecurity Awareness Month, as well as how to create and mature a software security program. The post Synopsys CSO: Cybersecurity Awareness Month lessons ...
[Webinars] How to risk rank vulnerabilities, insights from BSIMM10

[Webinars] How to risk rank vulnerabilities, insights from BSIMM10

Learn about five ways to approach risk ranking in vulnerability management, and hear key insights into real-life software security programs from BSIMM10. The post [Webinars] How to risk rank vulnerabilities, insights from ...