featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff01 Dec 20236 minsTechnology IndustryIT SkillsEvents news Almost all developers are using AI despite security concerns, survey suggestsBy John P. Mello Jr.29 Nov 20234 minsDevelopment ToolsSecurity PracticesSupply Chainfeature NIST provides solid guidance on software supply chain security in DevSecOps By Chris Hughes19 Oct 20239 minsDevSecOpsSupply ChainSecurity Practices featureHow CISOs can shift from application security to product securityBy Ericka Chickowski 30 Aug 202310 minsApplication SecuritySoftware Development newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma 16 May 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian's honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma 11 Apr 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman 04 Apr 20233 minsData PrivacyGenerative AIArtificial Intelligence feature23 DevSecOps tools for baking security into the development processBy James Martin and George V. Hulme 09 May 20228 minsApplication SecuritySecuritySoftware Development newsChainguard launches native Kubernetes compliance software EnforceBy Shweta Sharma 27 Apr 20223 minsApplication SecuritySoftware Development ArticlesopinionSoftware products aren't cookiesUnderstanding the security of third-party components.By Steve Lipner 20 Aug 2018 5 minsVulnerabilitiesSecuritySoftware Developmentfeature5 tips for getting started with DevSecOpsDon't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.By Scot Finnie 17 Jul 2018 9 minsApplication SecuritySoftware DevelopmentnewsDo you fully trust Microsoft with GitHub?With Microsoft acquiring GitHub, users have to decide if they will leave their repositories on GitHub or move backup copies to GitLab.By Ms. Smith 05 Jun 2018 4 minsGitHubMicrosoftOpen SourceopinionConway’s Law: does your organization's structure make software security even harder?Why secure development programs succeed in organizations.By Steve Lipner 07 May 2018 5 minsPatch Management SoftwareSecuritySoftware DevelopmentfeatureHow lean development improved software security at Fannie MaeContinual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.By Terena Bell 25 Apr 2018 6 minsApplication SecurityData and Information SecurityDevopsfeatureOpen source software security challenges persistUsing open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. By Maria Korolov 02 Apr 2018 10 minsInternet SecurityInternet SecurityInternet SecurityreviewsHow Contrast Security protects applications from the inside outContrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.By John Breeden 21 Feb 2018 7 minsApplication SecurityEnterprise ApplicationsSecuritynews analysisRating software security Consumer Reports-styleThe Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.By J.M. Porup 18 Jan 2018 8 minsApplication SecurityVulnerabilitiesSecurityopinionSoftware development teams: please don’t think like a hacker!Figuring out what to tell the developers to do is not as easy as telling them write secure code.By Steve Lipner 05 Dec 2017 4 minsHackingSecuritySoftware DevelopmentopinionDon’t build security tools, build developer tools insteadStop building security tools that think about dev, and start building dev tools that handle security.By Guy Podjarny 03 Nov 2017 4 minsDevopsOpen SourceSecurityreviewsInfoZen enables pre-deployment patching for DevOps codingFor this review, InfoZen was brought in to create a fully-end-to-end DevOps scanning solution using their InfoZen Cloud and DevOps Practice service. Even within our admittedly tiny test environment, the benefits of the InfoZen toolset and automatic processes were obvious.By John Breeden 23 Aug 2017 6 minsApplication SecurityDevopsSecurityopinionTop 5 container mistakes that cause security problemsAs enterprises increase their adoption of containers, they are also increasing the number of security mistakes they make with the technology.By Kacy Zurkus 14 Aug 2017 3 minsAccess ControlApplication SecurityOperating Systems Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. 25 Jan 2020 16 minsAnalyticsSoftware Development AI and machine learning in action 22 Jan 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny 10 May 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R 22 Mar 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis Attackers breach US government agencies through ColdFusion flaw By Lucian Constantin 06 Dec 20235 mins Advanced Persistent ThreatsAdvanced Persistent ThreatsAdvanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology By John P. Mello Jr. 06 Dec 20234 mins Application SecurityNetwork Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey By Gagandeep Kaur 06 Dec 20234 mins IT JobsSecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO