DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DataOps
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
  • Media Kit
  • About
  • Sponsor
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DataOps
  • DevSecOps
  • DevOps Onramp
  • Platform Engineering
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps
    • ROELBOB

Perforce

SAST time DevSecOps SAST DAST code

What is SAST? Overview + SAST Tools

Mitch Ashley | January 11, 2021 | perforce, SAST, Static Application Security Testing, what is SAST
Static Application Security Testing Overview With the growing number of cybersecurity threats, you must ensure that your software is protected against potential vulnerabilities and threats. One of the most beneficial practices is ...
vulnerabilities supply chain

Top 10 Common Software Vulnerabilities

Mitch Ashley | January 11, 2021 | perforce, software vulnerabilities, software vulnerability, vulnerabilities definition
An essential part of an effective software security process is being familiar with software vulnerabilities, which are flaws or weaknesses in your code. Often, testing and manual code reviews are unable to ...
CloudBees Compliance

5 Ways to Accelerate Standards Compliance With Static Code Analysis

Mitch Ashley | January 11, 2021 | how to accelerate standards compliance, perforce, standards compliance, standards compliance best practices
In mission- and safety-critical industries, static code analysis is essential to facilitating the development of robust and reliable software. However, according to VDC Research, a B2B technology market intelligence and consulting firm, ...
cloud security Orca embedded SASE DevSecOps

Top 10 Embedded Security Vulnerabilities

Mitch Ashley | January 11, 2021 | perforce, security vulnerabilities, Top 10 embedded security vulnerabilities
Nearly all of detected security vulnerabilities can be attributed to just 10 types. Here, we discuss the most common cybersecurity vulnerabilities and offer guidance on how to mitigate their risk. Vulnerability 10: ...
specialist

What Is ISO 21434? Compliance Tips for Automotive Software Developers

Mitch Ashley | January 11, 2021 | iso 21434, iso 21434 compliance, iso/sae 21434, perforce
What Is ISO 21434? Compliance Tips for Automotive Software Developers To read more, please visit: https://www.perforce.com/blog/qac/ISO-21434-Compliance ...
cybersecurity threats API security, JIT JUst in time security APIs What is the NIST Cybersecurity Framework

What is the NIST Cybersecurity Framework?

Mitch Ashley | January 11, 2021 | National Institute of Standards and Technology, NIST, NIST cybersecurity framework, perforce
Cybersecurity threats are easier to handle when you have a framework to build off of. That’s why NIST developed the Cybersecurity Framework. Learn more. What You Need to Know About the NIST ...
OWASP

What Is OWASP?

Mitch Ashley | January 11, 2021 | OWASP, OWASP static code analysis, OWASP Top 10, perforce, what is OWASP
With cybersecurity attacks rising, it is important for you to enforce secure software best practices, like OWASP and the OWASP Top 10. OWASP helps you to safeguard your code against software security ...
What Is PA-DSS?

What Is PA-DSS?

Mitch Ashley | January 11, 2021 | pa dss, pa dss compliance, perforce, what is pa dss
If you develop payment application software, you must ensure that it is secure and compliant with PA DSS. Read on to learn more about the payment application security standard. What You Need ...
Best Practices for a Secure Software Development Project

Best Practices for a Secure Software Development Project

Mitch Ashley | January 11, 2021 | perforce, secure software development best practices, secure software development project
The beginning of any new software development project can be daunting, as there are many decisions that need to be made and considerations that must be thought through. Often this includes defining ...
improvement

5 Ways to Improve Developer Output With Static Analysis

Mitch Ashley | January 11, 2021 | developer output, how to improve developer output, perforce
Developers often have to produce efficient, effective code under tight deadlines. Without the proper software development tools to support this work, coding errors and vulnerabilities could occur. For that reason, it is ...
supply chain Codenotary insider threats

How to Prevent Cybersecurity Threats With Secure Code

Mitch Ashley | January 11, 2021 | cybersecurity threats, perforce, prevent cybersecurity threats, what are cybersecurity threats
Unfortunately, cybersecurity attacks are an ever-present threat for organizations of all sizes and industries. In fact, a cybersecurity threat is estimated to occur every 39 seconds. For that reason, it is important ...
What is Differential Analysis?

What is Differential Analysis?

Mitch Ashley | January 11, 2021 | differential analysis, differential analysis examples, how does differential analysis work, perforce, what is differential analysis
Differential analysis is an emerging solution for static analysis tools. It is a relatively recent solution, but it's important to understand what it is, how it works and why you should care ...
Show More Loading...

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Achieving Complete Visibility in IT Operations, Analytics, and Security
Wednesday, February 1, 2023 - 11:00 am EST
Achieving DevSecOps: Reducing AppSec Noise at Scale
Wednesday, February 1, 2023 - 1:00 pm EST
Five Best Practices for Safeguarding Salesforce Data
Thursday, February 2, 2023 - 1:00 pm EST

Sponsored Content

The Google Cloud DevOps Awards: Apply Now!

January 10, 2023 | Brenna Washington

Codenotary Extends Dynamic SBOM Reach to Serverless Computing Platforms

December 9, 2022 | Mike Vizard

Why a Low-Code Platform Should Have Pro-Code Capabilities

March 24, 2021 | Andrew Manby

AWS Well-Architected Framework Elevates Agility

December 17, 2020 | JT Giri

Practical Approaches to Long-Term Cloud-Native Security

December 5, 2019 | Chris Tozzi

Latest from DevOps.com

Cisco AppDynamics Survey Surfaces DevSecOps Challenges
January 31, 2023 | Mike Vizard
Jellyfish Adds Tool to Visualize Software Development Workflows
January 31, 2023 | Mike Vizard
3 Performance Challenges as Chatbot Adoption Grows
January 31, 2023 | Christoph Börner
Looking Ahead, 2023 Edition
January 31, 2023 | Don Macvittie
How To Build Anti-Fragile Software Ecosystems
January 31, 2023 | Bill Doerrfeld

TSTV Podcast

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays

GET THE TOP STORIES OF THE WEEK

Most Read on DevOps.com

Microsoft Outage Outrage: Was it BGP or DNS?
January 25, 2023 | Richi Jennings
The Database of the Future: Seven Key Principles
January 25, 2023 | Nick Van Wiggerern
Don’t Hire for Product Expertise
January 25, 2023 | Don Macvittie
Harness Acquires Propelo to Surface Software Engineering Bot...
January 25, 2023 | Mike Vizard
Software Supply Chain Security Debt is Increasing: Here̵...
January 26, 2023 | Bill Doerrfeld
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2023 ·Techstrong Group, Inc.All rights reserved.