Category: Application Security

Beware of the unintended but often disastrous consequences of false positive in security
False Positive in security – Why We Like to Cry Wolf
Check out how CAST scores against these benchmarks and compares with other SAST solutions
Juliet and OWASP Benchmark Results: How CAST Tests Against 2 Most Important Application Security Standards in 2019
Two funny but relevant stories that highlight one of the most common SQL flaws
What Vanity License Plates can Teach Us About App Security and SQL Injection
My Key Takeaways
8 Lessons from Gartner Security Summit
Making a case for DevSecOps
A Case for DevSecOps
Software Intelligence lends transparency into legacy modernization for GDPR.
GDPR: Automating Compliance Measures with Automated Application Portfolio Analysis
Outlining the importance of secure, reliable software for the air travel industry.
CIO Perspective: Software Intelligence Puts SITA in Front of Airlines’ Back-Office App Issues
What GDPR enforcement means for proactive application security.
GDPR: New ‘Sheriff’ Places Responsibility for Data Privacy Squarely on Businesses
Insights from the 2018 MIT CIO Symposium.
CEO in the Field: Making Digital Transformation a Reality
How to automate software quality discovery and remediation with CAST.
Flying High with Software Intelligence: A Guide for Technical Leads (Part 2)
Software Intelligence holds the key to a successful transition from DevOps to DevSecOps.
DevSecOps Requires More than DevOps Patching
How government agencies can improve IT Modernization and streamline cloud readiness and migration.
‘My Government, My Way’ – Takeaways from the 2018 NASCIO Midyear Conference
To shift even further left, security and development teams should consider architectural blueprinting to build security into design.
Application Security: Next-Gen Security Includes Architectural Blueprinting
Application security postures must be multi-tiered and aligned with corporate software risk postures for optimal effectiveness.
Takeaways from ESRM: Not All AppSec Programs Are Created Equal
Ensuring secure software design starts with building a secure architecture.
Application Security: Smart Software Design Techniques to Shift Left
A tune-up may not be enough to help organizations adhere to MGT Act 101 to deliver secure and sustainable modernized systems.
Government Agencies and IT Modernization: What Will Propel the Great Leap Forward?
Step one? Improve your diet. The second? Make sure the software that runs your business is prepared to take on the road ahead.
3 Ways Startups Can Transform Software Intelligence Into an IPO
Follow these best practices for better data protection, more accurate security analysis and confident decision making.
Application security: 2 Steps to Improve Your Secure Engineering