Life-forms descend on Leipzig #34C3: Chaos Communication Congress
At the 34th Chaos Communication Congress (#34C3), life-forms descended on Leipzig to encourage people to use technology to make the world better. Or TUWAT.
4 Risks in connected cars: security implications of open source | Synopsys
At Flight Amsterdam I led a panel discussion on the security implications of open source in connected cars, joined by Gordon Haff and Simon Gutteridge.
Online Safety Tips to Promote Within Your Company | Synopsys
Raise security awareness in your organization. You’ll protect your employees and your business. Get started with these online safety tips.
5 DevSecOps essentials and how to achieve them | Synopsys
Embracing a DevSecOps practice requires key cultural and practical changes to integrate security into the SDLC. Learn about the 5 essentials for DevSecOps.
5 things to do before your threat modeling assessment | Synopsys
Here are 5 activities to undertake before your next threat modeling assessment that will set your team and organization up for success.
5 Reasons to Outsource Your Authentication Like You Do Your Credit Card ...
Implementing 1 or more of the providers doesn’t make security considerations go away, nor does it even make your application safe.
The 5 Pillars of a Successful Threat Model | Synopsys
Threat modeling identifies risks and flaws affecting a system.Here are 5 primary activities to perform when creating or updating a threat model.
6 months later, Spectre still haunts | Synopsys Software Integrity
It’s now more than six months since the major design flaw in computer chips labeled Spectre became public. And it's still haunting the world of information technology. For those who don’t have a ...
5 ways to pay back your technical debt | Synopsys
Technical debt accumulates if you don’t build security in throughout your development cycle. Here’s how to pay off old debt and stop creating new debt.
Checklist: 7 elements of GDPR software security compliance | Synopsys
Our GDPR compliance checklist explains seven steps you can take to improve your software security initiative and illustrate GDPR software security compliance.
7 myths about software security best practices | Synopsys
Software security best practices are meant to improve security initiatives, not secure single applications. Here are 7 software security myths to consider.
6 recommendations for healthcare cybersecurity | Synopsys
The Health Care Industry Cybersecurity Task Force published its recommendations this month, with six key recommendations for healthcare cybersecurity.
8 must-have features in an IAST solution | Synopsys
With so many vendors to choose from, finding the perfect IAST solution for your organization’s needs can be difficult. Here’s a checklist of 8 must-have features for any good IAST tool.
7 ways financial services firms can protect themselves | Synopsys
Here are seven strategies that financial services firms can use to improve data security, lock down their assets, and protect their customers and clients.
A Methodology for Quantifying Risks from Web Services | Synopsys
How do you quantify the risks from usage of Web Services that make calls to various APIs available commercially and in public domain for “free” usage?
8 Takeaways from NIST’s Application Container Security Guide | Synopsys
NIST published the “Application Container Security Guide” in September to address security risks associated with container adoption. Read 8 key takeaways.
AAMI TIR57 recognized by the FDA as a foundational cybersecurity standard for...
The AAMI TIR57 "Principles for medical device security - Risk management" standard was published by AAMI this summer.
3 ways abuse cases can drive security requirements | Synopsys
Learn how to use abuse cases to determine security requirements, strengthen controls, and improve the security of an application's business features.
Learn how to accelerate your agile security strategy | Synopsys
Find the most aerodynamic way to build security into agile development with a variety of tools that effectively meet your firm's challenges.
Abuse cases: How to think like a hacker | Synopsys
Writing abuse cases is an exercise in “thinking like the enemy." It's a great way to help secure your software and systems and stay ahead of attacks.
Achieving Open Source Security in Container Environments | Synopsys
How do you achieve open source security in containers? Companies need to have an understanding of the components and dependencies in their container images.
Add Security to Your SDLC With This Handy Checklist | Synopsys
This checklist will guide you throughout the development journey to assure that you’re integrating security into each of the seven SDLC artifacts.
Add security to your agile development process | Synopsys
How do you transition to agile security from traditional security to agile security? Learn how to add security to your agile development process.
IAST defined, plus the advantages of IAST for business-critical software
As an acronym, IAST is awkward to pronounce or to guess what it stands for. But as a testing tool, IAST is remarkably effective at rooting out potentially catastrophic bugs in web-based ...
Adobe Flash flaw compromises 'kid-friendly' tablet | Synopsys
A newly disclosed Adobe Flash security flaw allows remote hackers to follow a LeapFrog user's activity, activate the built-in microphone, and take pictures using the device's camera.