Category: Risk & Security

Our Pledge to Make the US Election System Safe and Secure for All.
How Software Intelligence Can Certify Safety in Critical Infrastructure
Three Ways CIOs Can Count on Software Intelligence for Improved IT Outcomes.
Software Intelligence Helps CIOs Direct Success, Not Horror Movies
How Software Intelligence Can Close the Security Gap in Software Development.
Secure Software Development: Error Sends UK’s NHS ‘Once More into the Breach’
Making a case for DevSecOps
A Case for DevSecOps
Don't let IT modernization become a daunting task. This quick primer will help you keep terminology straight and learn how to accelerate your modernization efforts.
IT Modernization: A Primer in Software Intelligence for Fast Transformation
The Hearst Business Media Approach? Eat the Elephant, One Bite at a Time.
How To Manage Software Risk During Mergers and Acquisitions
How to Take Advantage of Modern Architecture While Keeping Applications Safe and Secure.
Minimizing Software Risk in Open Source Development
Organizations continue to measure vendor performance and software products with outdated criteria. As a result, security and efficiency issues abound.
IT Vendor Management: Diagnosing the Relationships Between Healthcare Organizations and Software Vendors
To shift even further left, security and development teams should consider architectural blueprinting to build security into design.
Application Security: Next-Gen Security Includes Architectural Blueprinting
Application security postures must be multi-tiered and aligned with corporate software risk postures for optimal effectiveness.
Takeaways from ESRM: Not All AppSec Programs Are Created Equal
Open source is part of almost every software capability we use today. Can we be sure it's secure?
The Software Intelligence Report: What You Need to Know About Open Source Software
Step one? Improve your diet. The second? Make sure the software that runs your business is prepared to take on the road ahead.
3 Ways Startups Can Transform Software Intelligence Into an IPO
Follow these best practices for better data protection, more accurate security analysis and confident decision making.
Application security: 2 Steps to Improve Your Secure Engineering
La sostenibilità è nella Software Intelligence strutturale
GDPR e Cybersecurity By Design
Money talks, to the tune of $21M, and it says Software Intelligence is the cornerstone to reduce software risk.
The True Cost of Bad Software
As organizations adopt Software Intelligence to drive business outcomes, they may face challenges from development teams and architects. This is one story of success.
CEO in the Field: “If it was hard to write, it should be hard to understand.”
It doesn’t matter how many days removed we are from sipping champagne, singing "Auld Lang Synge" and making New Year’s resolutions, we still need to look back at 2017, lest we repeat the same mistakes we've already made.
2017: The Year of MotS (More of the Same)
Digital transformation is now a mandate, but it presents an opportunity for CIOs to reposition themselves at the heart of the business.
The Evolving Role of CIOs in the Age of Digital Transformation
CAST provides continuous support for OWASP Top Ten vulnerabilities, providing users with an automated validation of protection. This helps development teams detect places where vulnerabilities are left in code.
Application Security Vulnerability Detection