sdlc

Empowering Software Buyers Through Secure-by-Demand Guidelines
Interview by Deb Radcliff, editor of TalkSecure, hosted by CodeSecure and syndicated at YouTube, Bright Talk, and Security Boulevard Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released its Secure by Demand ...
Gen-AI Won’t Replace Humans – or SAST – In the SDLC
Interview with MITRE’s Tracey Bannon by industry analyst Deb Radcliff, editor of TalkSecure, hosted by CodeSecure and syndicated at Security Boulevard & YouTube Click HERE to listen. Whether people realize it or not, AI in ...

Responding to and Recovering from Mobile App Security Breaches
Zero Trust says “assume breach” and your response plan must cover handling third-party security incidents too. Mobile apps depend on third party APIs, and you need to be prepared to act quickly ...

How to integrate SBOMs into the software development life cycle
The widespread availability of third-party and open source software has significantly accelerated modern software development. These technologies also pose a risk, because the external code used by a company has not gone ...
SCA and CI/CD: The Most Delicious Alphabet Soup
In the continuous delivery (CI)/continuous delivery (CD) pipeline, one of the key ingredients to add to the pot is software composition analysis (SCA), an automated process that identifies the open source software ...
Where is Your Risk? Vulnerabilities in Software Development
Organizations are facing a variety of software-related risks, and vulnerabilities introduced in the development process are just one of them. The sooner they can figure out where these risks exist and how ...
Securing a Windows Development Environment
For many development organizations, Microsoft Windows remains the dominant operating platform. Therefore, ensuring the security of these systems needs to be a high priority for security leaders and teams and a Windows ...
Launching a Vulnerability Management Program
Launching a vulnerability management program requires a few methodical steps When President Biden’s executive order shone a light on the need to modernize and strengthen cybersecurity at the federal level, that arguably ...
Organizations Want to Adopt DevSecOps. What’s Getting in Their Way?
Security leaders are eager to move to a DevSecOps approach—and why wouldn’t they be? DevSecOps has been emerging as a key component in organizations’ efforts to build strong security into all the ...