TalkSecure Blog

Thank you for stopping by TalkSecure Blog, your go-to resource for the latest insights and expertise on DevSecOps, application security testing (AST), binary analysis, product security, software assurance, and more. Here, you’ll find a wealth of information on the best practices, trends, and breakthroughs in the field of cybersecurity, all aimed at helping you stay ahead of the curve and keep your digital assets safe.

  • Navigating the EU Cyber Resiliency Act

    Read More
  • MISRA validation on FreeRTOS

    Read More
  • Improving Software Quality with the OWASP BOM Model

    Read More
  • White House Urges Tossing C and C++ From Critical Infrastructure Systems… and why this is not a good idea.

    Read More
  • SBOMs Top of Mind at RSAC 2024

    Read More
  • Introducing BCA Marketplace: SBOM generation & management

    Read More
  • Code Complexity

    Read More
  • Best DevOps Practices for Embedded Micro-Systems

    Read More
  • Static Application Security Testing at Scale 

    Read More
  • SBOMs and the Secure Software Development Framework

    Read More
  • Integrating CodeSonar with VS Code and Dev Containers

    Read More
  • VEXing SBOMs

    Read More
  • Unleash the Full Potential of Your Software Development Team 

    Read More
  • Product Security Guidance for Medical Device Manufacturers

    Read More
  • Improving Medical Device Security with SBOMs and Logging

    Read More
  • What is SAST?

    Read More
  • Maximizing the Value of Static Analysis in Software Development 

    Read More
  • Advancements with Software Bills of Materials

    Read More
  • Improving Software Quality with the OWASP BOM Maturity Model

    Read More
  • SBOM Use Cases and Why Binary Composition Analysis Matters

    Read More
  • SBOM Examples

    Read More
  • 2024 Trends Affecting Software Product Security

    Read More
  • Expansion of Automation Capabilities for Complying with Leading Embedded Software Safety and Security Standards

    Read More
  • Will 2024 Be the Year of the Software Bill of Materials? Experts Weigh In.

    Read More
  • Managing the Lifecycle of Your Software Bills of Materials

    Read More
  • FDA Laws and Submission Guidance Catches up with Cyber Risks in Medical Devices

    Read More
  • The Power of Testing in Embedded Software: How wolfSSL uses CodeSecure to Enhance the Most Tested Open Source Software

    Read More
  • How to be MISRA compliant while using GitLab

    Read More
  • When Software Bugs are Dragons and Kids are Vanquishers

    Read More
  • Looking for a SAST Solution Engineered for Embedded and Product Security? Chose Wisely.

    Read More
  • Learn, Practice, Master: Foundations of DevSecOps Training

    Read More
  • DevSecOps Trend Drivers

    Read More
  • Software Consumers Are Not Waiting For SBOMs

    Read More
  • Static Analysis Finds & Pipelines

    Read More
  • The Power of Post-Production SBOMs

    Read More
  • Impact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers

    Read More
  • Hacking Embedded Applications

    Read More
  • SBOM Types: How We Got Here

    Read More
  • Depth of Analysis is the Key to Unlocking the value of SAST

    Read More
  • SBOM-A-RAMA – Update on all things SBOM.

    Read More
  • Artificial Intelligence Embedded in Code: Do’s and Don’ts for Commercial Developers

    Read More
  • CISA Self Attestation: Is there an impact on SBOM adoption?

    Read More
  • Building Resilience in Software Through Security Chaos Engineering

    Read More
  • Types of Software Bill of Materials

    Read More
  • DevSecOps Silos Apparent at RSA Security Conference 2023

    Read More
  • Shifting Left on Software Product Liability

    Read More
  • Securing Software for Healthy, Energy-Efficient Smart Buildings

    Read More
  • Software Factories and Bills of Materials

    Read More
  • DevSecOps Top of Mind in Aerospace and Defense Industries

    Read More
  • Top Considerations in Mastering SAST

    Read More
  • Hacking Embedded Devices

    Read More
  • From APIs and Automobiles: Hacker-Turned-Producer Alissa V. Knight

    Read More
  • Hybrid Cloud Deployment of SAST Tools

    Read More
  • SBOM Generation is Maturing. Now for the Hard Part

    Read More
  • Digital Supply Chain Risk Requires Board Oversight

    Read More
  • New Arms War: Applications

    Read More
  • 2022 DevSecOps in Review

    Read More
  • Software Vendors have 365 Days to Meet OMB Secure Development Requirements

    Read More
  • Speeding up SAST

    Read More
  • Using Binary Analysis to Hunt Down OSS Vulnerabilities

    Read More
  • Security is Foundational to Developer Satisfaction and Product Quality

    Read More
  • Automating Supply Chain Integrity

    Read More
  • Who Needs a Chief Product Security Officer?

    Read More
  • DHS Calls for “Excellence in Software” in Log4j Report

    Read More
  • How SBOMs Reduce Software Procurement Risk and Improve Enterprise Security

    Read More
  • Builders and Breakers

    Read More
  • Log4j and the Role of SBOMs in Reducing Software Security Risk

    Read More
  • Top three tips for ensuring software supply chain security

    Read More
  • Shift Left on APIs

    Read More
  • The ABCs of Application Security Testing

    Read More
  • Managing MISRA Violations

    Read More
  • DevSecOps is Big at RSA Conference This Year (2022)

    Read More
  • Log4j Taught Us a Valuable Lesson

    Read More
  • Women Helping Women in DevSecOps

    Read More
  • SDLC for Automotive Software Security

    Read More
  • SAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity

    Read More
  • DevSecOps Training with Intention

    Read More
  • Software Supply Chain Security Terminology

    Read More
  • CodeSecure CodeSonar Hybrid Cloud Deployment Model Accelerates Integration of SAST into DevSecOps Processes

    Read More
  • Role of SAST and SCA in ISO/SAE 21434 – Road Vehicles Cybersecurity Engineering

    Read More
  • Automotive Applications and SBOMs

    Read More
  • The Minefields of MISRA Coverage

    Read More
  • Advanced Driver Assistance, Safety, and SAST to Support ISO 26262

    Read More
  • Accelerating Automotive Software Safety with MISRA C and SAST

    Read More
  • To the Moon and Beyond: DevSecOps for Space Applications

    Read More
  • Introducing MISRA C Coding Standard to an Existing Code Base

    Read More
  • Common Software and Application Security Terms Explained

    Read More
  • Danger in the Skies: Software Driving Our Flights Interview with Aviation and Cybersecurity Expert, Barbara Filkins

    Read More
  • Calculating the ROI of SAST in DevSecOps for Embedded Software

    Read More
  • Code Blue on Healthcare Applications

    Read More
  • How Cyber Insurance Drives DevSecOps

    Read More
  • How To Address Digital Supply Chain Vulnerabilities

    Read More
  • Coming to Security Mandate Near You: SBOMs

    Read More
  • A Practical Approach to Shifting Security Left

    Read More
  • TCP/IP stacks vulnerabilities are a wake-up call for embedded software

    Read More
  • Software is the New Ground Zero Devops best practices predictions for 2022

    Read More
  • As drone adoption soars, expect greater regulation of embedded code

    Read More
  • Resiliency in Software = Recovery and Adaptability Through Software Quality

    Read More
  • Log4j 2 Vulnerability – Practical Advice and What’s Next for Software Supply Chain Security

    Read More
  • Software supply chain exploits are exploding–How to proactively prevent threats

    Read More

Book a Demo

We’re ready to help you integrate SAST and BCA security into your DevSecOps flow. Get a personally guided tour of our solution offerings to ensure you are receiving the right solution for your development team. 

book now