HID Global's three pillars of operational security

By Karin Althaus on June 15, 2022 Application Security

5 minute read time

The foundations of security at HID Global are a balanced set of tools, policies, and expertise. A look back at a DevSecOps Leadership Forums talks in Paris.
Read More...

Breaking organizational silos for better application security

By Phil Vuollet on July 08, 2021 AppSec

4 minute read time

Security depends on collaboration and communication. Our recent Elevate talk breaks down pillars, structure, and suggestions for organizational silos.
Read More...

Holding the industry accountable

4 minute read time

Humans often need to experience something before we change. As DevSecOps practitioners and leaders we should always be asking what needs changing and why.
Read More...

ZeroTrustOps: Securing at scale

By Sylvia Fronczak on June 19, 2020 AppSec

5 minute read time

With zero trust, you assume everything on the network is unsafe. You have to check trust explicitly. This stance improves security throughout the SDLC.
Read More...

Real Talk: What Users Really Look For in a Software Composition Analysis (SCA) Solution

By Alyssa Shames on May 12, 2020 AppSec

4 minute read time

Real users explain what you should demand from your SCA tools, including visibility through an SBOM, continuous monitoring, and the ability to scan apps.
Read More...

Your Guide to AppSec Tools: SAST or SCA?

By Alyssa Shames on April 16, 2020 AppSec

4 minute read time

Software composition analysis speeds time to innovation by automating manual open source governance processes that are prone to errors.
Read More...

Ryan Lockard Names the Seven Deadly Sins of DevSecOps [VIDEO]

By Mark Miller on April 02, 2020 AppSec

1 minute read time

Failures are an opportunity to reflect, inspect, and improve DevSecOps practices every day. Which of these have you experienced, and what did you learn?
Read More...

Getting Started with Sonatype Vulnerability Analysis

By Omkar Hiremath on March 26, 2020 vulnerabilities

7 minute read time

Sonatype Vulnerability Scanner is a free tool that scans your application for vulnerabilities and reports on its analysis.
Read More...

Bryson Koehler, Equifax CTO, Discusses the Road Ahead in Data Security Infrastructure

By Mark Miller on March 23, 2020 vulnerabilities

1 minute read time

Equifax is creating a customer driven platform that includes security automation and data privacy, all while building transparency into the process.
Read More...