Topic: sast

When does SCA replace SAST or DAST?

The short answer is never. There, I just saved you enough time that you can go and do the right thing and run SAST and DAST and work on hardening your code, instead of trying to test security into your application. Look, every time a new technology, process, or technique comes along there are some … continue reading

The future of application security

A crystal ball presentation on the future of application security at the Gartner Security and Risk Management Summit this year caught the eye of us in the software security space. In case you missed it, the top-line predictions were: By 2022, software composition analysis (SCA) will surpass traditional AST tools (SAST, DAST) as the primary … continue reading

SD Times news digest: XebiaLabs’ new DevOps Risk and Compliance features, Split’s free Feature Flag Edition, and Google’s changes to its SMS/Call Log policy

XebiaLabs has launched a new security and risk assessment solution for enterprises. The new solution features enhanced chain of custody reporting, a new security risk dashboard for software releases, and new at-a-glance compliance overviews. According to the company, this will help organizations track app release status and understand security better. “To effectively manage software delivery … continue reading

SD Times news digest: WearOS developer preview, Synopsys’ Coverity updates, and Apple App Store prohibits cryptocurrency mining

Google has announced new changes to the WearOS by Google developer preview. According to the company, battery life has been a major focus area. After reviewing developer feedback, the company found users were unhappy with the disabling of alarms and jobs for background apps. As a result, Google is reversing the change and will be … continue reading

WhiteHat Security: Improving application security with DevSecOps

Does the DevSecOps approach make a difference when it comes to improving application security? According to this year’s 12th annual WhiteHat Security “Application Security Statistics Report,” it certainly does. This year’s WhiteHat report includes a case study that details a large health organization’s successful implementation of a DevSecOps approach.  According to the study, critical vulnerabilities … continue reading

HTML Snippets Powered By : XYZScripts.com

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!