<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">
Steve Wolf

Steve Wolf

Recent Posts By Steve Wolf

Losing your Memory to Fortify – Tips on Memory Usage

It seems that no matter how much support you get from the vendors of these complicated test tools, there may still be ...

Methods for a Secure Lifecycle

I’m sure you have heard that to truly secure your application you need to incorporate security methods or processes ...

A Blog of the Past – “Training” not “Training”

In week two of National Cyber Awareness Month “From the Break Room to the Boardroom,” we bring back Steve’s post on the ...

Fortifying Static Analysis

The most popular on-premise solution for performing Static Application Security Testing is currently HP’s Fortify ...

“Training” not “Training”

Training your team to be secure developers can be a daunting task. However, if approached the right way it can lead to ...

Deploying SAST | Static Application Security Testing

If you read my previous post Selecting SAST you will have undergone the extensive process of selecting a very valuable ...

Selecting SAST | Static Application Security Assessment Tools

You cannot deploy this code. QA found critical security flaws. That’s something you never want to hear. Especially if ...

Secure the Weakest Link

Taking the Path of Least Resistance By taking a path of least resistance you are usually looking for the easiest, most ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments