featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO StaffNov 03, 20239 minsTechnology IndustryIT SkillsEvents feature NIST provides solid guidance on software supply chain security in DevSecOps By Chris HughesOct 19, 20239 minsDevSecOpsSupply ChainSecurity Practicesfeature How CISOs can shift from application security to product securityBy Ericka ChickowskiAug 30, 202310 minsApplication SecuritySoftware Development newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma May 16, 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian's honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma Apr 11, 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman Apr 04, 20233 minsData PrivacyGenerative AIArtificial Intelligence brandpostSponsored by SynopsysAutomation is the key component of DevSecOps collaboration and optimizationBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSecuritySoftware Development brandpostSponsored by SynopsysPoor software quality can cost time and money, straightforward solutions are availableBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSoftware Development brandpostSponsored by SynopsysSoftware risk is business risk--now is the time for C-Suite to actBy Jason Schmitt, General Manager, Synopsys Software Integrity Group Mar 13, 20234 minsDevopsSoftware Development Articlesfeature3 DevSecOps success storiesLearn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.By Michael Nadeau and Dan Swinhoe Sep 26, 2019 10 minsApplication SecuritySecuritySoftware DevelopmentfeatureVerizon builds a DevSecOps culture with its developer dashboardVerizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.By Dan Swinhoe Feb 26, 2019 8 minsApplication SecuritySecuritySoftware DevelopmentopinionThe ethics of creating secure softwareThe permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the whole of society. Security of that software is not a technical question, but a moral one, and companies need to treat it that way.By Chris Wysopal Sep 07, 2018 5 minsEnterprise ApplicationsSecuritySoftware DevelopmentfeatureSecrets of ‘shift left’ successThe shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.By Mary K. Pratt Aug 28, 2018 8 minsApplication SecurityDevopsSecurityopinionSoftware products aren't cookiesUnderstanding the security of third-party components.By Steve Lipner Aug 20, 2018 5 minsVulnerabilitiesSecuritySoftware Developmentfeature5 tips for getting started with DevSecOpsDon't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.By Scot Finnie Jul 17, 2018 9 minsApplication SecuritySoftware DevelopmentnewsDo you fully trust Microsoft with GitHub?With Microsoft acquiring GitHub, users have to decide if they will leave their repositories on GitHub or move backup copies to GitLab.By Ms. Smith Jun 05, 2018 4 minsGitHubMicrosoftOpen SourceopinionConway’s Law: does your organization's structure make software security even harder?Why secure development programs succeed in organizations.By Steve Lipner May 07, 2018 5 minsPatch Management SoftwareSecuritySoftware DevelopmentfeatureHow lean development improved software security at Fannie MaeContinual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.By Terena Bell Apr 25, 2018 6 minsApplication SecurityData and Information SecurityDevopsfeatureOpen source software security challenges persistUsing open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. By Maria Korolov Apr 02, 2018 10 minsInternet SecurityApplication SecurityVulnerabilitiesreviewsHow Contrast Security protects applications from the inside outContrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.By John Breeden Feb 21, 2018 7 minsApplication SecurityEnterprise ApplicationsSecuritynews analysisRating software security Consumer Reports-styleThe Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.By J.M. Porup Jan 18, 2018 8 minsApplication SecurityVulnerabilitiesSecurity Show more Show less View all Resources whitepaper Generative AI Opportunities Across Enterprise Service and Operations Management Learn from IDC and BMC Software industry experts how your ServiceOps environment can safely harness the power of Generative AI. The post Generative AI Opportunities Across Enterprise Service and Operations Management appeared first on Whitepaper Repository. By BMC Software 29 Nov 2023Business OperationsFunctions as a ServiceManaged IT Services whitepaper Securing the digital economy By Mastercard 29 Nov 2023Business OperationsBusiness Process ManagementProfessional Services whitepaper The Strategic Imperative for Software Supply Chain Security By JFrog 28 Nov 2023Business OperationsSecuritySupply Chain Management Software View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. Jan 25, 2020 16 minsAnalyticsSoftware Development AI and machine learning in action Jan 22, 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny May 10, 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R Mar 22, 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news FBI probes into Pennsylvanian water utility hack by pro-Iran group By Shweta Sharma Nov 29, 20234 mins CyberattacksUtilities Industry feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs By Maria Korolov Nov 29, 20239 mins Security PracticesVulnerabilitiesSecurity news Amazon’s AWS Control Tower aims to help secure your data’s borders By Jon Gold Nov 28, 20233 mins RegulationCloud Security podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO