In this webcast, Dr. Carol Woody and Michael Bandor discuss key software assurance activities that must be embedded within the acquisition lifecycle to be effective.
Almost every system used by the Department of Defense (DoD) depends on software. This dependence is not a new development, but the criticality of software has grown markedly over the past few decades.
HP plans to scoop up Fortify Software, a privately held security software company, in a bid to lock down applications throughout their life cycle. Neither HP nor Fortify disclosed the sum of the ...
Datadog’s DDOG security portfolio is emerging as a meaningful growth catalyst as the company moves beyond its observability foundation into broader security operations. Its multi-layered suite spans ...
On January 23, 2026, the Office of Management and Budget (OMB) reversed some relatively new requirements for secure software development that had been imposed on federal contractors. This move is ...
My friend and colleague Dan Swanson, CIA, runs a useful information assurance (IA) news and discussion service and has a valuable list of useful IA resources for us. I’m impressed by the quality of ...