In early 2020, an ambitious group of developers assembled to tackle the biggest cybersecurity challenge they had ever encountered – securing the software supply chain. They founded Phylum and got to work. Fast forward to today: it’s been about a year since Phylum launched its software supply chain security...
CircleCI, which is used by over 1 million developers to build, test and deploy software, has issued a brief security alert warning all customers to immediately "rotate any secrets stored in CircleCI" as it continues to probe a suspected two-week intrusion.
To detect potentially exploitable security vulnerabilities, organizations that create software tend to use solutions such as static, dynamic, and interactive application security testing (AST), to scan their source code.
While such solutions are effective at what they are designed for (scanning proprietary code),...
the conventional AppSec focus on identifying and fixing exploitable vulnerabilities in code is not enough. The software supply chain is being weaponized at an alarming rate and businesses must adapt their AppSec strategy in response.
This white paper explores why software supply chain security is more important than...
Software supply chain security (SCS) is rapidly gaining unwelcome notoriety as high-impact breaches hit the headlines.
Learn how bad actors have weaponized open source principles and why SBOM is just a baseline.
Download the whitepaper to learn more on
Strategies that go beyond SBOM;
How and why a...
As the pace of software development increases along with cloud migration to support it, organizations must take a new approach to security. DevSecOps—integrating security processes into the DevOps pipeline—can help organizations rapidly deliver secure and compliant application changes while running operations...
Palo Alto Networks will make its first major acquisition in nearly two years, scooping up application security startup Cider Security for $250 million. The Silicon Valley-based platform security behemoth will fork over $194.6 million of cash as well as $55.4 million of replacement equity for Cider.
President and CEO Sudhakar Ramakrishna says SolarWinds has done massive work implementing security into the build process since the company was hacked in late 2020. Testing, validating and qualifying the integrity of the company's source code has required significant effort, Ramakrishna tells ISMG.
Sonatype’s eighth annual State of the Software Supply Chain Report blends a broad set of public and proprietary data and analysis, including dependency update patterns for more than 131 billion Maven Central downloads and thousands of open source projects, survey results from 662 engineering professionals, and the...
According to Gartner, “By 2025, 75% of application development teams will implement SCA tools in their workflow, up from 40% today, in order to minimize the security and licensing risks associated with open-source software.”
From this report, gain insight on how to ensure minimal disruption to your development...
DevSecOps has been described as part strategy, part toolkit, part training and part cultural shift.
However, there’s no universal playbook on how to implement DevSecOps, and there can be conflict between DevOps prioritizing speed to market, functionality and revenue generation, versus SecOps striving to eliminate...
Remote access VPN has been an enterprise network staple for years. However, enterprises are rapidly adopting cloud applications that are changing the requirements for security and networking. Network and security teams are asking about how to secure access to all applications—not just those in the data center.
...
There are many factors to consider when choosing a SAST tool. DevSecOps has transformed the code security from a siloed, IT centric task to the continuous responsibility of development teams. As security becomes a central concern for developers, security professionals, and operations teams, the process for selecting a...
While DevSecOps comes with measurable benefits, it also comes with a cost for developers.
Aside from pulling them further from critical core tasks, we’re also asking them to be experts in areas that they may have no training.
Download this white paper to learn current solutions to that problem including:
Static...
Static application security testing (SAST) plays a major role in securing the software development lifecycle. It can address issues at the earliest stages of development so that you can address them before they become problematic.
Download this cheat sheet to learn some best practices when implementing a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.