Micro Focus is now part of OpenText. Learn more >

Here's a comprehensive picture of the benefits and potential drawbacks of using security testing tools in the SAST, DAST, IAST, & RASP categories.
Turning security into a game can deliver major returns for dev teams. Two experts share their experiences.
Pay attention to the quality of the code, especially with open source components, or you'll put your customers at risk.
Here's how to combine bug bounties and pen testing to boost security. Experts weigh in on this crowdsourcing trend.
Security and automation in containers is lacking and putting applications and data at risk. Here are four rules DevOps teams must follow.
Integrating security into your DevOps can be challenging. Here are five simple ways to make DevSecOps a reality in your organization.
Here's what your application security team needs to know about the changes in the OWASP Top Ten list.
As IoT devices multiply, so does the amount of data they contain. Built-in security is the answer. Here's where to focus.
OpenSAMM, BSIMM, and MS-SDLC, take approaches that resemble waterfall methodologies. These approaches to secure SDLC are failing many in the industry.
Whether your company is embarking on an application-security program or your program is running strong, finding the right metrics to track is key.

Pages