featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO StaffSep 08, 202318 minsTechnology IndustryTechnology IndustryTechnology Industry feature How CISOs can shift from application security to product securityBy Ericka ChickowskiAug 30, 202310 minsApplication SecuritySoftware Developmentnews Arnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta SharmaMay 16, 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian's honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma Apr 11, 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman Apr 04, 20233 minsData PrivacyGenerative AIArtificial Intelligence brandpostSponsored by SynopsysSoftware risk is business risk--now is the time for C-Suite to actBy Jason Schmitt, General Manager, Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSoftware Development brandpostSponsored by SynopsysPoor software quality can cost time and money, straightforward solutions are availableBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSoftware Development brandpostSponsored by SynopsysAutomation is the key component of DevSecOps collaboration and optimizationBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSecuritySoftware Development featureFor one software maker, an SBOM adds value to the productBy Mary K. Pratt Jun 15, 20227 minsApplication SecurityOpen SourceSecurity ArticlesfeatureVerizon builds a DevSecOps culture with its developer dashboardVerizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.By Dan Swinhoe Feb 26, 2019 8 minsApplication SecuritySecuritySoftware DevelopmentopinionThe ethics of creating secure softwareThe permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the whole of society. Security of that software is not a technical question, but a moral one, and companies need to treat it that way.By Chris Wysopal Sep 07, 2018 5 minsEnterprise ApplicationsSecuritySoftware DevelopmentfeatureSecrets of ‘shift left’ successThe shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.By Mary K. Pratt Aug 28, 2018 8 minsApplication SecurityDevopsSecurityopinionSoftware products aren't cookiesUnderstanding the security of third-party components.By Steve Lipner Aug 20, 2018 5 minsVulnerabilitiesSecuritySoftware Developmentfeature5 tips for getting started with DevSecOpsDon't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.By Scot Finnie Jul 17, 2018 9 minsApplication SecuritySoftware DevelopmentnewsDo you fully trust Microsoft with GitHub?With Microsoft acquiring GitHub, users have to decide if they will leave their repositories on GitHub or move backup copies to GitLab.By Ms. Smith Jun 05, 2018 4 minsGitHubMicrosoftOpen SourceopinionConway’s Law: does your organization's structure make software security even harder?Why secure development programs succeed in organizations.By Steve Lipner May 07, 2018 5 minsPatch Management SoftwareSecuritySoftware DevelopmentfeatureHow lean development improved software security at Fannie MaeContinual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.By Terena Bell Apr 25, 2018 6 minsApplication SecurityData and Information SecurityDevopsfeatureOpen source software security challenges persistUsing open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. By Maria Korolov Apr 02, 2018 10 minsInternet SecurityApplication SecurityVulnerabilitiesreviewsHow Contrast Security protects applications from the inside outContrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.By John Breeden Feb 21, 2018 7 minsApplication SecurityEnterprise ApplicationsSecuritynews analysisRating software security Consumer Reports-styleThe Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.By J.M. Porup Jan 18, 2018 8 minsApplication SecurityVulnerabilitiesSecurityopinionSoftware development teams: please don’t think like a hacker!Figuring out what to tell the developers to do is not as easy as telling them write secure code.By Steve Lipner Dec 05, 2017 4 minsHackingSecuritySoftware Development Show more Show less View all Resources whitepaper When Leaders Struggle with Collaboration Check out this article from Harvard Business Review and how to use those tools and insights to foster a collaborative culture and drive success! The post When Leaders Struggle with Collaboration appeared first on Whitepaper Repository. By Zoom 26 Sep 2023Business OperationsEducation and Training SoftwareZoom Video Communications whitepaper Lower UCaaS Spending by Leveraging Digital Workplace Tools By Zoom 26 Sep 2023Business IT AlignmentBusiness OperationsZoom Video Communications whitepaper Forrester Report: Make Digital Employee Experience the Centerpiece of your Digital Workplace Strategy By Zoom 26 Sep 2023Business OperationsRemote AccessZoom Video Communications View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. Jan 25, 2020 16 minsAnalyticsSoftware Development AI and machine learning in action Jan 22, 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny May 10, 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R Mar 22, 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos brandpost How an integrated platform approach improves OT security By Richard Springer Sep 26, 20235 mins Security news Teachers urged to enter schoolgirls into UK’s flagship cybersecurity contest By Michael Hill Sep 26, 20234 mins Back to SchoolEducation IndustryIT Training news CREST, IASME to deliver UK NCSC’s Cyber Incident Exercising scheme By Michael Hill Sep 26, 20233 mins IT Governance FrameworksIncident ResponseData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers Sep 07, 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical Sep 20, 202312 mins CSO and CISO video What is zero trust security? Sep 06, 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role Sep 06, 202310 mins CSO and CISO