Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2023

Software due diligence in M&A: Key considerations and risks

Software due diligence is crucial in M&A, but to approach it strategically you must understand its key considerations and risks. Mergers and acquisitions (M&As) can be a great way for companies to expand their offerings and market share. One of the biggest risk areas for M&A in tech deals is software plagued with vulnerabilities or that contains open source license compliance issues.

AppSec Decoded: Don't let your software supply chain poison your apps | Synopsys

Learn why it’s critical for organizations to focus on software supply chain risks. Hear from Anita D’Amico, vice president of cross-portfolio solutions and strategy at Synopsys, on her predictions for the software supply chain.

We're one step closer to knowing how to comply with EO 14028

CISA’s draft self-attestation form, published today, is a step in the right direction in demystifying EO 14028 compliance. It’s finally happened. For everyone who has been trying to figure out how to comply with President Biden’s Executive Order on Cybersecurity (EO 14028), you now have the answer—sort of.

Improving software supply chain security for cloud applications and workloads

You should consider the following tips, tricks and best practices to help improve your supply chain security in the cloud. The cloud has revolutionized the way businesses operate, providing a scalable and cost-effective solution for storing, processing, and sharing data. However, with this growth has come new security concerns, particularly around the cloud software supply chain.

Friend or foe: AI chatbots in software development

Yes, AI chatbots can write code very fast, but you still need human oversight and security testing in your AppSec program. Chatbots are taking the tech world and the rest of the world by storm—for good reason. Artificial intelligence (AI) large language model (LLM) tools can write things in seconds that would take humans hours or days—everything from research papers to poems to press releases, and yes, to computer code in multiple programming languages.

Polaris integrations: Secure development at the speed of business

Digitalization means you need to build more complex software than ever before – the Polaris Software Integrity Platform® can help. Whether you’re building software to run your business or selling software to other businesses, you’re relying on technologies like cloud computing, continuous integration/continuous deployment (CI/CD), microservices, and APIs to enable speed and agility in application development.

Black Duck SCA vs. Black Duck Audit Services

With a surplus of software security testing solutions on the market, identifying the right SCA solution has never been more important. In today’s world, there is an increasingly large number of software security tools and testing solutions available with a range of capabilities, including software composition analysis (SCA), for managing open source risks.

Container security essentials

As the preferred method for packaging and deploying cloud-native applications, a comprehensive understanding of containers, and how to secure them, has never been so important. As cloud-native applications continue to proliferate, containers are becoming the preferred option to package and deploy these applications because of the agility and scalability they offer. In fact, Gartner predicts that 75% of global organizations are running containerized applications in production.

Why cross-site scripting still matters

With web application exploits the 3rd-most-common cybersecurity threat, overlooking the importance of XSS vulnerabilities puts you at risk. As we move through 2023, many organizations are looking at their cybersecurity programs and considering how to allocate their application security testing resources. While allocating testing resources to OWASP Top 10 vulnerabilities like cross-site scripting (XSS) may not feel innovative, it’s one of the best ways to ensure an organization’s security.

Polaris Software Integrity Platform | Synopsys

Looking for an efficient and effective way to test your applications for security vulnerabilities? Look no further than Polaris Software Integrity Platform, the cloud-based application security testing solution optimized for the needs of development and DevSecOps teams. With Polaris, developers can easily onboard and begin scanning their code in just a matter of minutes, while security teams can effortlessly track and manage testing activities and risks across hundreds or even thousands of applications.

Polaris: Your no-compromise SaaS AST solution

Polaris Software Integrity Platform® – a SaaS application security testing solution delivering speed without compromise. Faster, faster, faster. The pressure is on to do business faster, to develop faster, and to secure all of this with faster and faster AppSec. Businesses want to release products, services, and apps to their customers on shorter and shorter release cycles.

OWASP Top 10: Security misconfiguration

Listed at #5 in the OWASP Top 10 list, security misconfiguration refers to vulnerabilities that result from an application’s configuration. As with insecure design, security misconfiguration is a broad category within the OWASP Top 10. These types of misconfigurations can occur at any level of an application stack, so it’s critical for DevSecOps teams to work together to ensure the entire stack is properly set up.