How to improve secure coding education

Did you know that not one of the top 50 undergraduate computer science programs in the U.S. requires a course in code or application security for majors? Yet the threatscape is only expanding. A recent report by Security Journey reveals the gap left by academia when developers are being trained to write code, and the […]

Continue Reading

What developers want and how to keep them on your team

OutSystems released a new developer jobs report identifying the factors that motivate them to stay with their companies and the frustrations that drive them away. The report, Developer Engagement Report: Are Your Developers Happy or Halfway Out The Door?, draws on data from 860 global developers from different backgrounds to identify trends regarding satisfaction and […]

Continue Reading

Véhicules autonomes : quels sont les risques de vulnérabilité logicielle et qui en est responsable ?

Le véhicule autonome soulève des problématiques complexes : une seule défaillance, un seul piratage ou un seul accident, et c’est la question suivante qui revient sans cesse : à qui attribuer la responsabilité des vulnérabilités logicielles dont les conséquences sont parfois dramatiques ? Tribune par Nabil Bousselham, architecte de solutions informatiques chez Veracode. « Nous sommes […]

Continue Reading

Simplifying legal entity identification in the digital age

As the world’s legal entities rush to digitize their processes and transactions, confidence in digital authenticity is in short supply. Thankfully, a single, open and universal protocol that will enable legal entities everywhere to verify the authenticity of digital information and its sources is now emerging. In this video for Help Net Security, Karla McKenna, […]

Continue Reading

Barely one-third of IT pros can vet code for tampering

Global research commissioned by ReversingLabs and conducted by Dimensional Research, revealed that software development teams are increasingly concerned about supply chain attacks and tampering, but barely a third said they can effectively vet the security of developed and published code for tampering. Dimensional Research surveyed more than 300, global IT and security professionals. Respondents included […]

Continue Reading

Massive shadow code risk for world’s largest businesses

Source Defense announced the results of a study that for the first time sizes the security, privacy, and compliance risks that are literally designed into the digital supply chains of major business websites. This risk, originating from highly dynamic and unpredictable scripts and code from third parties and beyond, permeates every aspect of a business’s […]

Continue Reading

Are businesses ready to implement cloud-native development?

OutSystems released findings from a global survey of IT leaders and developers gauging the benefits and challenges of cloud-native development, with results highlighting stark contrasts between expectations and readiness. The report reveals that while analysts expect a sharp rise in cloud-native development globally, 53% of respondents still don’t know much about it. “Cloud-native technology unlocks […]

Continue Reading

Principles for Kubernetes security and good hygiene

Traditional methods of software security are not a good fit for Kubernetes: a renewed set of security implementations are required to make it less vulnerable. What’s different about Kubernetes security? This article walks through several key ideas that comprise software security and highlights why they’re a poor fit for Kubernetes-based infrastructure. The second half discusses […]

Continue Reading

81% of codebases contain known open source vulnerabilities

Synopsys released a report which examines the results of more than 2,400 audits of commercial and proprietary codebases from merger and acquisition transactions, and highlights trends in open source usage within commercial and proprietary applications and provides insights to help developers better understand the interconnected software ecosystem. The report also details the pervasive risks posed […]

Continue Reading