featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff01 Dec 20236 minsTechnology IndustryIT SkillsEvents news Almost all developers are using AI despite security concerns, survey suggestsBy John P. Mello Jr.29 Nov 20234 minsDevelopment ToolsSecurity PracticesSupply Chainfeature NIST provides solid guidance on software supply chain security in DevSecOps By Chris Hughes19 Oct 20239 minsDevSecOpsSupply ChainSecurity Practices featureHow CISOs can shift from application security to product securityBy Ericka Chickowski 30 Aug 202310 minsApplication SecuritySoftware Development newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma 16 May 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian's honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma 11 Apr 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman 04 Apr 20233 minsData PrivacyGenerative AIArtificial Intelligence feature23 DevSecOps tools for baking security into the development processBy James Martin and George V. Hulme 09 May 20228 minsApplication SecuritySecuritySoftware Development newsChainguard launches native Kubernetes compliance software EnforceBy Shweta Sharma 27 Apr 20223 minsApplication SecuritySoftware Development ArticlesfeatureSecrets of ‘shift left’ successThe shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.By Mary K. Pratt 28 Aug 2018 8 minsApplication SecurityDevopsSecurityopinionSoftware products aren't cookiesUnderstanding the security of third-party components.By Steve Lipner 20 Aug 2018 5 minsVulnerabilitiesSecuritySoftware Developmentfeature5 tips for getting started with DevSecOpsDon't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.By Scot Finnie 17 Jul 2018 9 minsApplication SecuritySoftware DevelopmentnewsDo you fully trust Microsoft with GitHub?With Microsoft acquiring GitHub, users have to decide if they will leave their repositories on GitHub or move backup copies to GitLab.By Ms. Smith 05 Jun 2018 4 minsGitHubMicrosoftOpen SourceopinionConway’s Law: does your organization's structure make software security even harder?Why secure development programs succeed in organizations.By Steve Lipner 07 May 2018 5 minsPatch Management SoftwareSecuritySoftware DevelopmentfeatureHow lean development improved software security at Fannie MaeContinual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.By Terena Bell 25 Apr 2018 6 minsApplication SecurityData and Information SecurityDevopsfeatureOpen source software security challenges persistUsing open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. By Maria Korolov 02 Apr 2018 10 minsInternet SecurityApplication SecurityVulnerabilitiesreviewsHow Contrast Security protects applications from the inside outContrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.By John Breeden 21 Feb 2018 7 minsApplication SecurityEnterprise ApplicationsSecuritynews analysisRating software security Consumer Reports-styleThe Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.By J.M. Porup 18 Jan 2018 8 minsApplication SecurityVulnerabilitiesSecurityopinionSoftware development teams: please don’t think like a hacker!Figuring out what to tell the developers to do is not as easy as telling them write secure code.By Steve Lipner 05 Dec 2017 4 minsHackingSecuritySoftware DevelopmentopinionDon’t build security tools, build developer tools insteadStop building security tools that think about dev, and start building dev tools that handle security.By Guy Podjarny 03 Nov 2017 4 minsDevopsOpen SourceSecurityreviewsInfoZen enables pre-deployment patching for DevOps codingFor this review, InfoZen was brought in to create a fully-end-to-end DevOps scanning solution using their InfoZen Cloud and DevOps Practice service. Even within our admittedly tiny test environment, the benefits of the InfoZen toolset and automatic processes were obvious.By John Breeden 23 Aug 2017 6 minsApplication SecurityDevopsSecurity Show more Show less View all Resources whitepaper Test & Learn - The ultimate guide to delivering high quality, high impact products This year, the Progressive Delivery and Experimentation Summit, brought together nearly 1500 professionals. Leaders from Product, Engineering, and Data presented frameworks for adapting software development and delivery practices The post Test & Learn – The ultimate guide to delivering high quality, high impact products appeared first on Whitepaper Repository. By Optimizely 18 Sep 2023Business OperationsFinance and Accounting SystemsMarketing Software whitepaper Modernize and Scale on AWS By Koan 22 Aug 2023Amazon Web ServicesCloud ManagementIT Management whitepaper The Total Economic Impact(TM) Of Optimizely Digital Experience Platform By Optimizely 06 Aug 2023Business OperationsFinance and Accounting SystemsMarketing Software View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. 25 Jan 2020 16 minsAnalyticsSoftware Development AI and machine learning in action 22 Jan 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny 10 May 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R 22 Mar 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK CSO 30 Awards 2023 winners announced By Romy Tuin 05 Dec 20234 mins CSO and CISOC-SuiteRoles news analysis Deepfakes emerge as a top security threat ahead of the 2024 US election By Cynthia Brumfield 05 Dec 20237 mins Election HackingGovernmentSecurity Practices feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte 05 Dec 202312 mins Advanced Persistent ThreatsThreat and Vulnerability ManagementRisk Management podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO