DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Perforce

vulnerabilities supply chain

Top 10 Common Software Vulnerabilities

Mitch Ashley | January 11, 2021 | perforce, software vulnerabilities, software vulnerability, vulnerabilities definition
An essential part of an effective software security process is being familiar with software vulnerabilities, which are flaws or weaknesses in your code. Often, testing and manual code reviews are unable to ...
What is SAST? Overview + SAST Tools

What is SAST? Overview + SAST Tools

Mitch Ashley | January 11, 2021 | perforce, SAST, Static Application Security Testing, what is SAST
Static Application Security Testing Overview With the growing number of cybersecurity threats, you must ensure that your software is protected against potential vulnerabilities and threats. One of the most beneficial practices is ...
Best Practices for a Secure Software Development Project

Best Practices for a Secure Software Development Project

Mitch Ashley | January 11, 2021 | perforce, secure software development best practices, secure software development project
The beginning of any new software development project can be daunting, as there are many decisions that need to be made and considerations that must be thought through. Often this includes defining ...
CloudBees Compliance

5 Ways to Accelerate Standards Compliance With Static Code Analysis

Mitch Ashley | January 11, 2021 | how to accelerate standards compliance, perforce, standards compliance, standards compliance best practices
In mission- and safety-critical industries, static code analysis is essential to facilitating the development of robust and reliable software. However, according to VDC Research, a B2B technology market intelligence and consulting firm, ...
cloud security Orca embedded SASE DevSecOps

Top 10 Embedded Security Vulnerabilities

Mitch Ashley | January 11, 2021 | perforce, security vulnerabilities, Top 10 embedded security vulnerabilities
Nearly all of detected security vulnerabilities can be attributed to just 10 types. Here, we discuss the most common cybersecurity vulnerabilities and offer guidance on how to mitigate their risk. Vulnerability 10: ...
specialist

What Is ISO 21434? Compliance Tips for Automotive Software Developers

Mitch Ashley | January 11, 2021 | iso 21434, iso 21434 compliance, iso/sae 21434, perforce
What Is ISO 21434? Compliance Tips for Automotive Software Developers To read more, please visit: https://www.perforce.com/blog/qac/ISO-21434-Compliance ...
What is the NIST Cybersecurity Framework?

What is the NIST Cybersecurity Framework?

Mitch Ashley | January 11, 2021 | National Institute of Standards and Technology, NIST, NIST cybersecurity framework, perforce
Cybersecurity threats are easier to handle when you have a framework to build off of. That’s why NIST developed the Cybersecurity Framework. Learn more. What You Need to Know About the NIST ...
OWASP

What Is OWASP?

Mitch Ashley | January 11, 2021 | OWASP, OWASP static code analysis, OWASP Top 10, perforce, what is OWASP
With cybersecurity attacks rising, it is important for you to enforce secure software best practices, like OWASP and the OWASP Top 10. OWASP helps you to safeguard your code against software security ...
What Is PA-DSS?

What Is PA-DSS?

Mitch Ashley | January 11, 2021 | pa dss, pa dss compliance, perforce, what is pa dss
If you develop payment application software, you must ensure that it is secure and compliant with PA DSS. Read on to learn more about the payment application security standard. What You Need ...
assurance

Guide for Software Development & Software Security

Mitch Ashley | January 11, 2021 | devsecops, perforce, software development, software development project, software security
In order to ensure an efficient, secure and successful software development project, there are many factors that you and your team must consider when starting a new project. The most common and ...
improvement

5 Ways to Improve Developer Output With Static Analysis

Mitch Ashley | January 11, 2021 | developer output, how to improve developer output, perforce
Developers often have to produce efficient, effective code under tight deadlines. Without the proper software development tools to support this work, coding errors and vulnerabilities could occur. For that reason, it is ...
Codenotary insider threats

How to Prevent Cybersecurity Threats With Secure Code

Mitch Ashley | January 11, 2021 | cybersecurity threats, perforce, prevent cybersecurity threats, what are cybersecurity threats
Unfortunately, cybersecurity attacks are an ever-present threat for organizations of all sizes and industries. In fact, a cybersecurity threat is estimated to occur every 39 seconds. For that reason, it is important ...
Show More Loading...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Continuous Deployment
Monday, July 11, 2022 - 1:00 pm EDT
Using External Tables to Store and Query Data on MinIO With SQL Server 2022
Tuesday, July 12, 2022 - 11:00 am EDT
Goldilocks and the 3 Levels of Cardinality: Getting it Just Right
Tuesday, July 12, 2022 - 1:00 pm EDT

Latest from DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New Normal’
June 30, 2022 | Richi Jennings
Moving From Lift-and-Shift to Cloud-Native
June 30, 2022 | Alexander Gallagher
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

The Automated Enterprise
The Automated Enterprise

Most Read on DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New No...
June 30, 2022 | Richi Jennings
Chip-to-Cloud IoT: A Step Toward Web3
June 28, 2022 | Nahla Davies
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.