TalkSecure Blog
Thank you for stopping by TalkSecure Blog, your go-to resource for the latest insights and expertise on DevSecOps, application security testing (AST), binary analysis, product security, software assurance, and more. Here, you’ll find a wealth of information on the best practices, trends, and breakthroughs in the field of cybersecurity, all aimed at helping you stay ahead of the curve and keep your digital assets safe.
Navigating the EU Cyber Resiliency Act
Read MoreMISRA validation on FreeRTOS
Read MoreImproving Software Quality with the OWASP BOM Model
Read MoreWhite House Urges Tossing C and C++ From Critical Infrastructure Systems… and why this is not a good idea.
Read MoreSBOMs Top of Mind at RSAC 2024
Read MoreIntroducing BCA Marketplace: SBOM generation & management
Read MoreCode Complexity
Read MoreBest DevOps Practices for Embedded Micro-Systems
Read MoreStatic Application Security Testing at Scale
Read MoreSBOMs and the Secure Software Development Framework
Read MoreIntegrating CodeSonar with VS Code and Dev Containers
Read MoreVEXing SBOMs
Read MoreUnleash the Full Potential of Your Software Development Team
Read MoreProduct Security Guidance for Medical Device Manufacturers
Read MoreImproving Medical Device Security with SBOMs and Logging
Read MoreWhat is SAST?
Read MoreMaximizing the Value of Static Analysis in Software Development
Read MoreAdvancements with Software Bills of Materials
Read MoreImproving Software Quality with the OWASP BOM Maturity Model
Read MoreSBOM Use Cases and Why Binary Composition Analysis Matters
Read MoreSBOM Examples
Read More2024 Trends Affecting Software Product Security
Read MoreExpansion of Automation Capabilities for Complying with Leading Embedded Software Safety and Security Standards
Read MoreWill 2024 Be the Year of the Software Bill of Materials? Experts Weigh In.
Read MoreManaging the Lifecycle of Your Software Bills of Materials
Read MoreFDA Laws and Submission Guidance Catches up with Cyber Risks in Medical Devices
Read MoreThe Power of Testing in Embedded Software: How wolfSSL uses CodeSecure to Enhance the Most Tested Open Source Software
Read MoreHow to be MISRA compliant while using GitLab
Read MoreWhen Software Bugs are Dragons and Kids are Vanquishers
Read MoreLooking for a SAST Solution Engineered for Embedded and Product Security? Chose Wisely.
Read MoreLearn, Practice, Master: Foundations of DevSecOps Training
Read MoreDevSecOps Trend Drivers
Read MoreSoftware Consumers Are Not Waiting For SBOMs
Read MoreStatic Analysis Finds & Pipelines
Read MoreThe Power of Post-Production SBOMs
Read MoreImpact of the White House Cybersecurity Strategy Implementation Plan on Software Product Makers
Read MoreSBOM Types: How We Got Here
Read MoreDepth of Analysis is the Key to Unlocking the value of SAST
Read MoreSBOM-A-RAMA – Update on all things SBOM.
Read MoreCISA Self Attestation: Is there an impact on SBOM adoption?
Read MoreBuilding Resilience in Software Through Security Chaos Engineering
Read MoreTypes of Software Bill of Materials
Read MoreDevSecOps Silos Apparent at RSA Security Conference 2023
Read MoreShifting Left on Software Product Liability
Read MoreSecuring Software for Healthy, Energy-Efficient Smart Buildings
Read MoreSoftware Factories and Bills of Materials
Read MoreDevSecOps Top of Mind in Aerospace and Defense Industries
Read MoreTop Considerations in Mastering SAST
Read MoreHacking Embedded Devices
Read MoreFrom APIs and Automobiles: Hacker-Turned-Producer Alissa V. Knight
Read MoreHybrid Cloud Deployment of SAST Tools
Read MoreSBOM Generation is Maturing. Now for the Hard Part
Read MoreDigital Supply Chain Risk Requires Board Oversight
Read MoreNew Arms War: Applications
Read More2022 DevSecOps in Review
Read MoreSoftware Vendors have 365 Days to Meet OMB Secure Development Requirements
Read MoreSpeeding up SAST
Read MoreUsing Binary Analysis to Hunt Down OSS Vulnerabilities
Read MoreSecurity is Foundational to Developer Satisfaction and Product Quality
Read MoreAutomating Supply Chain Integrity
Read MoreWho Needs a Chief Product Security Officer?
Read MoreDHS Calls for “Excellence in Software” in Log4j Report
Read MoreHow SBOMs Reduce Software Procurement Risk and Improve Enterprise Security
Read MoreBuilders and Breakers
Read MoreLog4j and the Role of SBOMs in Reducing Software Security Risk
Read MoreTop three tips for ensuring software supply chain security
Read MoreShift Left on APIs
Read MoreThe ABCs of Application Security Testing
Read MoreManaging MISRA Violations
Read MoreDevSecOps is Big at RSA Conference This Year (2022)
Read MoreLog4j Taught Us a Valuable Lesson
Read MoreWomen Helping Women in DevSecOps
Read MoreSDLC for Automotive Software Security
Read MoreSAST and SCA Solutions Essential to Meeting UN Regulation No. 155 for Vehicle Cybersecurity
Read MoreDevSecOps Training with Intention
Read MoreSoftware Supply Chain Security Terminology
Read MoreCodeSecure CodeSonar Hybrid Cloud Deployment Model Accelerates Integration of SAST into DevSecOps Processes
Read MoreRole of SAST and SCA in ISO/SAE 21434 – Road Vehicles Cybersecurity Engineering
Read MoreAutomotive Applications and SBOMs
Read MoreThe Minefields of MISRA Coverage
Read MoreAdvanced Driver Assistance, Safety, and SAST to Support ISO 26262
Read MoreAccelerating Automotive Software Safety with MISRA C and SAST
Read MoreTo the Moon and Beyond: DevSecOps for Space Applications
Read MoreIntroducing MISRA C Coding Standard to an Existing Code Base
Read MoreCommon Software and Application Security Terms Explained
Read MoreDanger in the Skies: Software Driving Our Flights Interview with Aviation and Cybersecurity Expert, Barbara Filkins
Read MoreCalculating the ROI of SAST in DevSecOps for Embedded Software
Read MoreCode Blue on Healthcare Applications
Read MoreHow Cyber Insurance Drives DevSecOps
Read MoreHow To Address Digital Supply Chain Vulnerabilities
Read MoreComing to Security Mandate Near You: SBOMs
Read MoreA Practical Approach to Shifting Security Left
Read MoreTCP/IP stacks vulnerabilities are a wake-up call for embedded software
Read MoreSoftware is the New Ground Zero Devops best practices predictions for 2022
Read MoreAs drone adoption soars, expect greater regulation of embedded code
Read MoreResiliency in Software = Recovery and Adaptability Through Software Quality
Read MoreLog4j 2 Vulnerability – Practical Advice and What’s Next for Software Supply Chain Security
Read MoreSoftware supply chain exploits are exploding–How to proactively prevent threats
Read More
Book a Demo
We’re ready to help you integrate SAST and BCA security into your DevSecOps flow. Get a personally guided tour of our solution offerings to ensure you are receiving the right solution for your development team.
book now