Software Integrity Blog

Archive for the 'Application Security' Category

To improve DevSecOps, set application security priorities

Where does application security fit into DevSecOps?Everywhere: from preventing vulnerabilities to securing open source to prioritizing significant defects.

Continue Reading...

Posted inAgile, CI/CD & DevOps,Application Security

Too many security tools can be as bad as too few

Security tool sprawl has made many teams so overwhelmed by security alerts that they can’t respond to them.Here’s how to deal with security tool overload.

Continue Reading...

Posted inApplication Security

How to champion security in DevOps

Making the shift from DevOps to DevSecOps requires better communication, which you can help your teams accomplish with security training and enablement.

Continue Reading...

Posted inAgile, CI/CD & DevOps,Application Security

New DevSecOps study highlights need to address AppSec throughout the SDLC

The findings reaffirm the importance of shifting security left in the development process, enabling development teams with ongoing training as well as tooling solutions that complement their current processes so they can code securely without negatively impacting their velocity.

Continue Reading...

Posted inAgile, CI/CD & DevOps,Application Security

How DevSecOps done right makes application security easier

How do you integrate application security into DevOps?By enabling your developers to address security issues with automation, integration, and training.

Continue Reading...

Posted inAgile, CI/CD & DevOps,Application Security

Are you making software security a requirement?

Robust software security requirements help you lock down what your software does so that it can be used only as intended.Learn how to build your own.

Continue Reading...

Posted inApplication Security,Software Architecture & Design

[Webinars] Static analysis best practices, remote security testing and training

In this week’s webinars, we’ll share how to get the most out of your static analysis tool and how to make the transition from on-site to remote testing.

Continue Reading...

Posted inApplication Security,Automotive Cyber Security,Software Security Program,Static Analysis (SAST),Webinars

Authentication Token Obtain and Replace (ATOR) Burp plugin to handle complex login sequences

The Authentication Token Obtain and Replace (ATOR) plugin, built on ExtendedMacro, supports complex login sequences in Burp and is fast and easy to use.

Continue Reading...

Posted inApplication Security

How to Cyber Security: Software testing is cool

Software security testing involves knocking down walls, scaling fences, and otherwise breaking applications to generate helpful feedback for development.

Continue Reading...

Posted inApplication Security

How to overcome the top 6 application security challenges

Take a closer look at the most common application security challenges and how managed services can help you overcome them proactively and cost-effectively.

Continue Reading...

Posted inApplication Security,Software Security Program