Natalie Tischler

Natalie Tischler

Natalie Tischler believes in a world where software is built secure from the start. She writes content for Veracode that focuses on empowering harmony between Security and Development teams.

Stay up to date on Application Security

Posts by Natalie Tischler
  • Top 5 Open Source Security Risks IT…
    | By Natalie Tischler

    Lurking in the open source software (OSS) that pervades applications around the world are open source security risks technology leaders must be aware of. Software is one of technology’s most vulnerable subsets with over 70% of applications containing security flaws. Here are the open source…

    Read Article
     
  • New Data Reveals Top Drivers of Secure…
    | By Natalie Tischler

    Across the globe, the financial services sector is affected by increased security regulations. To name a few, there is the United States’ Executive Order on Improving the Nation’s Cybersecurity, the European Union’s NIS2 Directive, the SEC’s new rules on disclosures, and ISO 20022. With so much…

    Read Article
     
  • What Security Practitioners Can Learn…
    | By Natalie Tischler

    Developing and maintaining secure code at scale is hard. Having the right Static Application Security Testing (SAST) solution makes it easier, but how are practitioners to choose? In the following interview, you’ll learn about three emerging trends from detailed analysis of the SAST landscape in…

    Read Article
     
  • Why Reduce Software Supply Chain Risks…
    | By Natalie Tischler

    There’s a growing array of risks lurking within the supply chain of the digital solutions we increasingly depend upon. Leaving gaps in your software supply chain security (SSCS) could spell disaster for your organization. Let’s explore how new analysis defines an end-to-end solution and why…

    Read Article
     
  • Security Researchers Share Insights on…
    | By Natalie Tischler

    Shocking to no one: Artificial Intelligence (AI) was a huge topic at Black Hat USA 2023, but what did we learn about it? With no shortage of talks on it, there are many insights to take into account. We asked highly skilled Software Security Researchers who attended both Black Hat and DEFCON to…

    Read Article
     
  • Why SCA is Critical for Securing the…
    | By Natalie Tischler

    Weaknesses within software supply chains create a foothold for exploitation from cyberattacks. The problem is so significant that even the White House released an Executive Order that speaks directly on this topic. “The Federal Government must take action to rapidly improve the security and…

    Read Article