software development
![GitLab](https://img.helpnetsecurity.com/wp-content/uploads/2022/08/24123913/gitlab-24082022-01-400x200.jpg)
Self-managed GitLab installations should be patched again (CVE-2024-0402)
Less than two weeks after having plugged a security hole that allows account takeover without user interaction, GitLab Inc. has patched a critical vulnerability …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/22145250/laptop-data2-400x200.png)
The dynamic relationship between AI and application development
In this Help Net Security video, Greg Ellis, General Manager, Application Security, at Digital.ai, discusses how artificial intelligence is revolutionizing the way …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101938/genai4-400x200.jpg)
Security automation gains traction, prompting a “shift everywhere” philosophy
The use of automated security technology is growing rapidly, which in turn is propagating the “shift everywhere” philosophy – performing security tests throughout the entire …
![chain](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/13152651/chain5-400x200.jpg)
CISOs vs. developers: A battle over security priorities
A majority of both developers and CISOs view software supply chain security as a top priority in their roles (70% and 52% respectively), according to Chainguard. However, …
![kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/13214620/kubernetes-logo-400x200.jpg)
Kubernetes adoption creates new cybersecurity challenges
To maintain a competitive edge, modern organizations are evolving toward highly scalable, flexible and resilient applications – leading to the widespread adoption of cloud …
![GenAI](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27101944/genai2-400x200.jpg)
AI-assisted coding and its impact on developers
The emergence of AI has put into question the roles of software developers everywhere. In this Help Net Security video, Cat Hicks, VP of Research Insights at Pluralsight, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/03124019/microsoft-soc-400x200.jpg)
Microsoft launches new initiative to augment security
Nearly 22 years after Bill Gates announced a concerted Microsoft-wide push to deliver Trustworthy Computing, the company is launching the Secure Future Initiative, to boost …
![North Korea](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/21143809/north_korea-400x200.jpg)
North Korean hackers are targeting software developers and impersonating IT workers
State-sponsored North Korean hackers have significantly intensified their focus on the IT sector in recent years, by infiltrating firms developing software and companies …
![Steam](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/17160825/steam1-400x200.jpg)
Valve introduces SMS-based confirmation to prevent malicious games on Steam
Video game publisher/digital distribution company Valve is forcing developers who publish games on its Steam platform to “validate” new builds with a confirmation …
![open-source software](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/07185811/open-source_software-400x200.jpg)
The root cause of open-source risk
2023 saw twice as many software supply chain attacks as 2019-2022 combined. Sonatype logged 245,032 malicious packages in 2023. One in eight open-source downloads today poses …
![Chalk](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/29101547/chalk-crash_override-400x200.jpg)
Chalk: Open-source software security and infrastructure visibility tool
Chalk is a free, open-source tool that helps improve software security. You add a single line to your build script, and it will automatically collect and inject metadata into …
![Nima Baiati](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/21112757/nima_baiati-2-lenovo-400x200.jpg)
The pitfalls of neglecting security ownership at the design stage
For companies to avoid bleeding millions through cyber threats, they must build adaptability into their security strategy from the start while considering a range of inputs …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD