Why Software Composition Analysis (SCA) Demands Precision

As leaders in software composition analysis (SCA), we know its role throughout today’s software supply chain. SCA was born out of necessity. How else could innovators discover, identify, and track open source ...
The Open Source Cookbook: A Baker’s Guide to Modern Application Development

The Open Source Cookbook: A Baker’s Guide to Modern Application Development

It is often said that open source software is like a recipe. In this context, let’s discuss your grandmother’s favorite cookies. It’s quite possible your grandmother is known throughout the family as ...
Demystifying PCI Software Security Framework: All You Need to Know for Your AppSec Strategy

Demystifying PCI Software Security Framework: All You Need to Know for Your AppSec Strategy

If your organization is developing a payment app or even just using one in your product, then this webinar is for you.  The Payment Card Industry (PCI) Security Standards Council recently released a new security framework to ...
Huawei P10

Addressing UK Security Concerns in Huawei Products May Take 5 Years, Exec Says

Huawei’s been having a rough time recently. After the US, New Zealand and Australia prevented the telecom company from working on their 5G mobile networks for fear it would spy for the ...
Top Priority in National Cyber Strategy

OSS Security a Top Priority in National Cyber Strategy

The U.S. House of Representatives Committee on Energy and Commerce recently released its Cybersecurity Strategy Report, in which the committee identified several key concepts and principles to address and prevent cybersecurity incidents ...
Security Boulevard
AppSec Is Dead, but Software Security Is Alive & Well

AppSec Is Dead, but Software Security Is Alive & Well

Everyone agrees that an enterprise’s application ecosystem must be protected, especially when data breaches are reported with alarming frequency and the average total cost of a breach comes in at $3.62 million ...
Managing Software Security: 10 Essential Best Practices [Infographic]

Managing Software Security: 10 Essential Best Practices [Infographic]

Is your software security program up to the challenges of a rapidly accelerating software delivery environment? Most aren’t – and it’s challenging to both identify the problems and determine the best ways ...
Should DevOps and Security be in Couples Counseling?

Why Security and DevOps Desperately Need Couples Counseling

While at the 2018 Black Hat Conference in Las Vegas I asked attendees point blank if they think that security and DevOps should be in couples counseling. The universal response was a ...
Checkmarx Report: Tackling Software Exposure in the DevOps Cycle

Checkmarx Report: Tackling Software Exposure in the DevOps Cycle

Today, in an effort to better understand the evolving nature of software delivery and the role security plays, we released a new report, “Managing Software Exposure: Time to Fully Embed Security into ...
Loading...