featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff03 Nov 20239 minsTechnology IndustryIT SkillsEvents feature NIST provides solid guidance on software supply chain security in DevSecOps By Chris Hughes19 Oct 20239 minsDevSecOpsSupply ChainSecurity Practicesfeature How CISOs can shift from application security to product securityBy Ericka Chickowski30 Aug 202310 minsApplication SecuritySoftware Development newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma 16 May 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian's honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma 11 Apr 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman 04 Apr 20233 minsData PrivacyGenerative AIArtificial Intelligence feature23 DevSecOps tools for baking security into the development processBy James Martin and George V. Hulme 09 May 20228 minsApplication SecuritySecuritySoftware Development newsChainguard launches native Kubernetes compliance software EnforceBy Shweta Sharma 27 Apr 20223 minsApplication SecuritySoftware Development news analysisGitHub makes Advisory Database public to improve software supply chain securityBy Michael Hill 22 Feb 20223 minsDevSecOpsSoftware Development ArticlesopinionSoftware products aren't cookiesUnderstanding the security of third-party components.By Steve Lipner 20 Aug 2018 5 minsVulnerabilitiesSecuritySoftware Developmentfeature5 tips for getting started with DevSecOpsDon't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.By Scot Finnie 17 Jul 2018 9 minsApplication SecuritySoftware DevelopmentnewsDo you fully trust Microsoft with GitHub?With Microsoft acquiring GitHub, users have to decide if they will leave their repositories on GitHub or move backup copies to GitLab.By Ms. Smith 05 Jun 2018 4 minsGitHubMicrosoftOpen SourceopinionConway’s Law: does your organization's structure make software security even harder?Why secure development programs succeed in organizations.By Steve Lipner 07 May 2018 5 minsPatch Management SoftwareSecuritySoftware DevelopmentfeatureHow lean development improved software security at Fannie MaeContinual improvement methodologies strengthen security, shorten dev cycles and help the c-suite see infosec’s value.By Terena Bell 25 Apr 2018 6 minsApplication SecurityData and Information SecurityDevopsfeatureOpen source software security challenges persistUsing open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security. By Maria Korolov 02 Apr 2018 10 minsInternet SecurityApplication SecurityVulnerabilitiesreviewsHow Contrast Security protects applications from the inside outContrast Security has one of the most elegant solutions out there for application security. We can see why it scored 100 percent on the OWASP Security Benchmark.By John Breeden 21 Feb 2018 7 minsApplication SecurityEnterprise ApplicationsSecuritynews analysisRating software security Consumer Reports-styleThe Cyber Independent Testing Lab (CITL) is fuzzing binaries at scale and building a checklist of compile-time security best practices.By J.M. Porup 18 Jan 2018 8 minsApplication SecurityVulnerabilitiesSecurityopinionSoftware development teams: please don’t think like a hacker!Figuring out what to tell the developers to do is not as easy as telling them write secure code.By Steve Lipner 05 Dec 2017 4 minsHackingSecuritySoftware DevelopmentopinionDon’t build security tools, build developer tools insteadStop building security tools that think about dev, and start building dev tools that handle security.By Guy Podjarny 03 Nov 2017 4 minsDevopsOpen SourceSecurityreviewsInfoZen enables pre-deployment patching for DevOps codingFor this review, InfoZen was brought in to create a fully-end-to-end DevOps scanning solution using their InfoZen Cloud and DevOps Practice service. Even within our admittedly tiny test environment, the benefits of the InfoZen toolset and automatic processes were obvious.By John Breeden 23 Aug 2017 6 minsApplication SecurityDevopsSecurityopinionTop 5 container mistakes that cause security problemsAs enterprises increase their adoption of containers, they are also increasing the number of security mistakes they make with the technology.By Kacy Zurkus 14 Aug 2017 3 minsAccess ControlApplication SecurityOperating Systems Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. 25 Jan 2020 16 minsAnalyticsSoftware Development AI and machine learning in action 22 Jan 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny 10 May 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R 22 Mar 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How a digital design firm navigated its SOC 2 audit By Alex Levin 28 Nov 202311 mins CertificationsCertificationsIT Training news GE investigates alleged data breach into confidential projects: Report By Shweta Sharma 27 Nov 20233 mins Data Breach opinion A year after ChatGPT’s debut, is GenAI a boon or the bane of the CISO’s existence? By Christopher Burgess 27 Nov 20236 mins Generative AIData and Information SecuritySecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO