featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff01 Apr 202417 minsTechnology IndustryIT SkillsEvents news Majority of commercial codebases contain high-risk open-source codeBy Grant Gross29 Feb 20244 minsSecurity AuditsOpen SourceSoftware Developmentfeature Roundup: Global software supply chain security guidance and regulationsBy Chris Hughes08 Jan 20248 minsGovernmentSupply ChainSecurity Practices newsAlmost all developers are using AI despite security concerns, survey suggestsBy John Mello Jr. 29 Nov 20234 minsDevelopment ToolsSecurity PracticesSupply Chain featureNIST provides solid guidance on software supply chain security in DevSecOps By Chris Hughes 19 Oct 20239 minsDevSecOpsSupply ChainSecurity Practices featureHow CISOs can shift from application security to product securityBy Ericka Chickowski 30 Aug 202310 minsApplication SecuritySoftware Development newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma 16 May 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian’s honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma 11 Apr 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman 04 Apr 20233 minsData PrivacyGenerative AIArtificial Intelligence Articlesfeature23 DevSecOps tools for baking security into the development processCatch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.By James Martin and George V. Hulme 09 May 2022 8 minsApplication SecuritySecuritySoftware DevelopmentnewsChainguard launches native Kubernetes compliance software EnforceChainguard’s Enforce is designed to help developers define and enact policies for container images to enable safer deployment. By Shweta Sharma 27 Apr 2022 3 minsApplication SecuritySoftware Developmentnews analysisGitHub makes Advisory Database public to improve software supply chain securityResearchers, academics, and enthusiasts can now contribute to and benefit from free, open-source security data on software supply chain vulnerabilities.By Michael Hill 22 Feb 2022 3 minsDevSecOpsSoftware Developmentnews analysisNPM JavaScript registry suffers massive influx of malware, report saysThe NPM JavaScript registry has experienced a jump in malware, including packages related to data theft, crypto mining, botnets, and remote code execution, according to security company WhiteSource.By Shweta Sharma 03 Feb 2022 5 minsSecuritySoftware DevelopmentfeatureTop 10 in-demand cybersecurity skills for 2021The list of needed security skills is long and growing. Here's what experts say is driving the demand.By Mary Pratt 15 Dec 2020 9 minsIT SkillsRisk ManagementCareersfeatureHow secure are your AI and machine learning projects?Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk.By Maria Korolov 26 Nov 2020 13 minsApplication SecurityData and Information SecuritySecurityfeature4 best practices to avoid vulnerabilities in open-source codeOpen-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems.By Ax Sharma 13 Aug 2020 7 minsApplication SecurityOpen SourceSecurityfeatureWhat is devsecops? Why it’s hard to do wellDevsecops is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.By Lucian Constantin 23 Jul 2020 10 minsApplication SecurityDevopsSecurityreviewsReview: How ShiftLeft catches vulnerabilities during code developmentThis combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.By John Breeden 16 Mar 2020 7 minsApplication SecuritySecuritySoftware Developmentfeature3 DevSecOps success storiesLearn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.By Michael Nadeau and Dan Swinhoe 26 Sep 2019 10 minsApplication SecuritySecuritySoftware DevelopmentfeatureVerizon builds a DevSecOps culture with its developer dashboardVerizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset.By Dan Swinhoe 26 Feb 2019 8 minsApplication SecuritySecuritySoftware DevelopmentopinionThe ethics of creating secure softwareThe permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the whole of society. Security of that software is not a technical question, but a moral one, and companies need to treat it that way.By Chris Wysopal 07 Sep 2018 5 minsEnterprise ApplicationsSecuritySoftware Development Show more Show less View all Resources whitepaper Are You Data and AI Ready? Digital transformation creates a $100 trillion opportunity for enterprises, but also leads to infrastructure challenges with data exchange and platform growth. The post Are You Data and AI Ready? appeared first on Whitepaper Repository –. By Digital Realty Trust, L.P. 14 Mar 2024Other whitepaper Magic Quadrant for Distributed File Systems and Object Storage By Dell Technologies and Intel® 24 Feb 2023Business ContinuityDigital TransformationEnterprise Storage whitepaper Top Reasons Why Customers Choose Dell VxRail By Dell Technologies Solutions and Intel® 24 Feb 2023Digital TransformationHyperconverged InfrastructureSoftware Development View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. 25 Jan 2020 16 minsAnalyticsSoftware Development AI and machine learning in action 22 Jan 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny 10 May 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R 22 Mar 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers news Top cybersecurity product news of the week By CSO staff 29 Mar 202470 mins Generative AISecurity podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence