Speeding up SAST

Balancing Application Security Testing Results and Resources 

 

Using Binary Analysis to Hunt Down OSS Vulnerabilities

Having an SBOM and software inventory aids in identifying 3rd-party vulnerabilities and risk 

Top three tips for ensuring software supply chain security

At a time when “software supply chain attack” has become a household phrase, the recent vulnerability discovered in the Apache ...

SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity

The World Forum for Harmonization of Vehicle Regulations (WP.29) of the United Nations Economic Commission for Europe (UNECE)...

TCP/IP stacks vulnerabilities are a wake-up call for embedded software

URGENT/11 and other recent vulnerabilities such as AMNESIA:33 related to embedded TCP/IP stacks indicate a deficiency in...