featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO StaffDec 01, 20236 minsTechnology IndustryIT SkillsEvents news Almost all developers are using AI despite security concerns, survey suggestsBy John P. Mello Jr.Nov 29, 20234 minsDevelopment ToolsSecurity PracticesSupply Chainfeature NIST provides solid guidance on software supply chain security in DevSecOps By Chris HughesOct 19, 20239 minsDevSecOpsSupply ChainSecurity Practices featureHow CISOs can shift from application security to product securityBy Ericka Chickowski Aug 30, 202310 minsApplication SecuritySoftware Development newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma May 16, 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian's honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma Apr 11, 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman Apr 04, 20233 minsData PrivacyGenerative AIArtificial Intelligence brandpostSponsored by SynopsysAutomation is the key component of DevSecOps collaboration and optimizationBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSecuritySoftware Development brandpostSponsored by SynopsysPoor software quality can cost time and money, straightforward solutions are availableBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSoftware Development ArticlesreviewsReview: How ShiftLeft catches vulnerabilities during code developmentThis combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.By John Breeden Mar 16, 2020 7 minsApplication SecuritySecuritySoftware Developmentfeature3 DevSecOps success storiesLearn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.By Michael Nadeau and Dan Swinhoe Sep 26, 2019 10 minsApplication SecuritySecuritySoftware DevelopmentfeatureVerizon builds a DevSecOps culture with its developer dashboardVerizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.By Dan Swinhoe Feb 26, 2019 8 minsApplication SecuritySecuritySoftware DevelopmentopinionThe ethics of creating secure softwareThe permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the whole of society. Security of that software is not a technical question, but a moral one, and companies need to treat it that way.By Chris Wysopal Sep 07, 2018 5 minsEnterprise ApplicationsSecuritySoftware DevelopmentfeatureSecrets of ‘shift left’ successThe shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.By Mary K. Pratt Aug 28, 2018 8 minsApplication SecurityDevopsSecurityopinionSoftware products aren't cookiesUnderstanding the security of third-party components.By Steve Lipner Aug 20, 2018 5 minsVulnerabilitiesSecuritySoftware Developmentfeature5 tips for getting started with DevSecOpsDon't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.By Scot Finnie Jul 17, 2018 9 minsApplication SecuritySoftware DevelopmentnewsDo you fully trust Microsoft with GitHub?With Microsoft acquiring GitHub, users have to decide if they will leave their repositories on GitHub or move backup copies to GitLab.By Ms. Smith Jun 05, 2018 4 minsGitHubMicrosoftOpen SourceopinionConway’s Law: does your organization's structure make software security even harder?Why secure development programs succeed in organizations.By Steve Lipner May 07, 2018 5 minsPatch Management SoftwareSecuritySoftware DevelopmentfeatureHow lean development improved software security at Fannie MaeContinual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.By Terena Bell Apr 25, 2018 6 minsApplication SecurityData and Information SecurityDevopsfeatureOpen source software security challenges persistUsing open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. By Maria Korolov Apr 02, 2018 10 minsInternet SecurityApplication SecurityVulnerabilitiesreviewsHow Contrast Security protects applications from the inside outContrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.By John Breeden Feb 21, 2018 7 minsApplication SecurityEnterprise ApplicationsSecurity Show more Show less View all Resources whitepaper Accelerate Autonomous Vehicle Technology Development Systems architects and solutions developers are understandably eager to take part in this wave of opportunity. And thanks to the emergence of edge AI computing platforms built to support autonomous technology, that will be increasingly feasible The post Accelerate Autonomous Vehicle Technology Development appeared first on Whitepaper Repository. By Intel Corporation 04 Dec 2023Application Performance ManagementEnterprise ArchitectureSystem Management whitepaper Unlocking the Full Potential of Live Video Over Cellular By Intel Corporation 04 Dec 2023Application Performance ManagementCellular NetworksTV and Video whitepaper How to think about Trustworthy AI - in 2024 and beyond By SAS 04 Dec 2023Artificial IntelligenceBusiness OperationsDigital Transformation View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. Jan 25, 2020 16 minsAnalyticsSoftware Development AI and machine learning in action Jan 22, 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny May 10, 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R Mar 22, 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte Dec 05, 202312 mins Advanced Persistent ThreatsAdvanced Persistent ThreatsAdvanced Persistent Threats news analysis P2Pinfect Redis worm targets IoT with version for MIPS devices By Lucian Constantin Dec 04, 20235 mins BotnetsHacker GroupsSecurity Practices news Hackers book profit by scamming Booking.com customers By Gagandeep Kaur Dec 04, 20234 mins Cyberattacks podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO