featureThe CSO guide to top security conferencesTracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.By CSO Staff01 Apr 202417 minsTechnology IndustryIT SkillsEvents news Majority of commercial codebases contain high-risk open-source codeBy Grant Gross29 Feb 20244 minsSecurity AuditsOpen SourceSoftware Developmentfeature Roundup: Global software supply chain security guidance and regulationsBy Chris Hughes08 Jan 20248 minsGovernmentSupply ChainSecurity Practices newsAlmost all developers are using AI despite security concerns, survey suggestsBy John Mello Jr. 29 Nov 20234 minsDevelopment ToolsSecurity PracticesSupply Chain featureNIST provides solid guidance on software supply chain security in DevSecOps By Chris Hughes 19 Oct 20239 minsDevSecOpsSupply ChainSecurity Practices featureHow CISOs can shift from application security to product securityBy Ericka Chickowski 30 Aug 202310 minsApplication SecuritySoftware Development newsArnica's real-time, code-risk scanning tools aim to secure supply chainBy Shweta Sharma 16 May 20234 minsDevSecOpsSupply ChainSoftware Development newsGitGuardian’s honeytokens in codebase to fish out DevOps intrusionBy Shweta Sharma 11 Apr 20234 minsIntrusion Detection SoftwareSoftware Development newsUK data regulator issues warning over generative AI data protection concernsBy Charlotte Trueman 04 Apr 20233 minsData PrivacyGenerative AIArtificial Intelligence ArticlesbrandpostSponsored by SynopsysAutomation is the key component of DevSecOps collaboration and optimizationYour journey to DevSecOps excellence starts with automation, focus on these 3 recommendationsBy Taylor Armerding, Security Advocate at Synopsys Software Integrity Group 13 Mar 2023 4 minsDevopsSecuritySoftware DevelopmentbrandpostSponsored by SynopsysPoor software quality can cost time and money, straightforward solutions are availableTop IT leaders get it—if it’s high quality, with security “built-in” throughout development, software can make a business successful.By Taylor Armerding, Security Advocate at Synopsys Software Integrity Group 13 Mar 2023 4 minsDevopsSoftware DevelopmentbrandpostSponsored by SynopsysSoftware risk is business risk—now is the time for C-Suite to actWhile software introduces new ways of doing business, it can also introduce serious new risks. When it comes to digital transformation, don’t let inherit risks stand in the way of the competitive advantage your business seeks. By Jason Schmitt, General Manager, Synopsys Software Integrity Group 13 Mar 2023 4 minsDevopsSoftware DevelopmentfeatureFor one software maker, an SBOM adds value to the productAt Instant Connect, an SBOM has become part of the product offering, says Chief Product Officer Wes Wells.By Mary Pratt 15 Jun 2022 7 minsApplication SecurityOpen SourceSecuritybrandpostSponsored by CrowdStrikeHow Shift Left Security Helps Developers Build More Secure Cloud-Native AppsFor your DevOps teams to fully embrace the cloud, security must be at the forefront of their considerations. The good news? DevOps does not have to sacrifice security in order to move faster.By Guilherme (Gui) Alvarenga, Sr. Product Marketing, Cloud Security, CrowdStrike 25 May 2022 3 minsDevopsIT LeadershipSoftware Developmentfeature23 DevSecOps tools for baking security into the development processCatch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.By James Martin and George V. Hulme 09 May 2022 8 minsApplication SecuritySecuritySoftware DevelopmentnewsChainguard launches native Kubernetes compliance software EnforceChainguard’s Enforce is designed to help developers define and enact policies for container images to enable safer deployment. By Shweta Sharma 27 Apr 2022 3 minsApplication SecuritySoftware Developmentnews analysisGitHub makes Advisory Database public to improve software supply chain securityResearchers, academics, and enthusiasts can now contribute to and benefit from free, open-source security data on software supply chain vulnerabilities.By Michael Hill 22 Feb 2022 3 minsDevSecOpsSoftware Developmentnews analysisNPM JavaScript registry suffers massive influx of malware, report saysThe NPM JavaScript registry has experienced a jump in malware, including packages related to data theft, crypto mining, botnets, and remote code execution, according to security company WhiteSource.By Shweta Sharma 03 Feb 2022 5 minsSecuritySoftware DevelopmentfeatureTop 10 in-demand cybersecurity skills for 2021The list of needed security skills is long and growing. Here's what experts say is driving the demand.By Mary Pratt 15 Dec 2020 9 minsIT SkillsRisk ManagementCareersfeatureHow secure are your AI and machine learning projects?Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk.By Maria Korolov 26 Nov 2020 13 minsApplication SecurityData and Information SecuritySecurityfeature4 best practices to avoid vulnerabilities in open-source codeOpen-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems.By Ax Sharma 13 Aug 2020 7 minsApplication SecurityOpen SourceSecurity Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository –. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoHow to code an interactive shiny app to search Twitter: Do More With R bonus videoLearn how to turn code from Episode 41 into an interactive shiny Web app. 25 Jan 2020 16 minsAnalyticsSoftware Development AI and machine learning in action 22 Jan 2020 24 minsSoftware Development How to boost R Markdown interactivity with runtime Shiny 10 May 2019 13 minsJavaR LanguageSoftware Development How to use tidy eval in R 22 Mar 2019 8 minsR LanguageFunctions as a ServiceAnalytics See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news AT&T suffers critical breach impacting 73 million customers By Shweta Sharma 01 Apr 20244 mins Data Breach feature Recruit for diversity: Practical ways to remove bias from the hiring process By Aimee Chanthadavong 01 Apr 20248 mins Careers news Top cybersecurity product news of the week By CSO staff 29 Mar 202470 mins Generative AISecurity podcast CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO podcast CSO Executive Sessions: Former convicted hacker Hieu Minh Ngo on blindspots in data protection 20 Feb 202421 mins CSO and CISO podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video CSO Executive Sessions: Geopolitical tensions in the South China Sea – why the private sector should care 01 Apr 202416 mins CSO and CISO video CSO Executive Sessions: 2024 International Women's Day special 13 Mar 202410 mins CSO and CISO video LockBit feud with law enforcement feels like a TV drama 05 Mar 202456 mins RansomwareArtificial Intelligence