A guide to Gary McGraw's AppSec USA 2014 keynote | Synopsys
Gary McGraw delivered the Friday morning keynote at AppSec USA 2014. Watch “BSIMM: A Decade of Software Security” and read along with his guide.
Architecture Analysis & Software Design Flaws | Synopsys
Get resources on the importance of architecture analysis and software security design flaws. Finding bugs in code is easier, but flaws remain a challenge.
Have you learned the art of building a security strategy? | Synopsys
Join us for an hour-long webinar on Tuesday, May 2, 2017 at 9:00am PT covering the art of creating a software security strategy.
Artificial intelligence for open source risk management | Synopsys
Can Artificial Intelligence, data mining, machine learning & natural language processing solve open source risk management issues with security?
As FDA Medical Device Comment Period Ends, 2 Healthcare Organizations Call ...
2 healthcare executive organizations are calling on the FDA and the HHS to produce more guidance for medical device manufacturers.
Service Oriented Architectures | Cigital
A review of how input validation and entitlement evaluation have been implemened within service-oriented architectures (SOA).
Asus Settlement Prompts Federal Monitoring | Synopsys
Owners of the compromised devices received a message on their computers that read "This is an automated message being sent out to everyone effected [sic].
What you should know about the recent Atlanta ransomware attack | Synopsys
The attack is believed to be the result of the SamSam malware that has compromised various healthcare, government, and educational systems in recent years.
How to Assess the Risk of Seemingly Correct Software | Synopsys
As the prevalence of software continues to trend upwards with time, a common assumption is that it is becoming more feature-rich and reliable.
ATMs to IoT: The Generational Divide of Digital Trust | Synopsys
At a time where application security testing should be more prominent, it is being pushed aside in the name of agility or through neglect.
Can we please drive passwords into extinction now? | Synopsys
Passwords are antiquated and insecure. It’s time to eliminate them altogether. Experts from FIDO explain how to enable authentication without passwords.
Attributes of secure web application architecture | Synopsys
Consider these attributes of secure web application architecture to improve your web application security against common attacks and meet business needs.
GDPR Expert Opinion | Adam Brown
Adam Brown is a security solutions manager at Synopsys.
Automotive Security Expert Opinion | Art Dahnert
Art Dahnert is a managing consultant at Synopsys. He has an extensive and varied automotive background. He also has certifications in several automotive technologies as well as experience working ...
Cloud Security Expert Opinion | AlJowhara AlSuwailem
AlJowhara AlSuwailem is a security consultant at Synopsys who specializes in security architecture reviews, cloud security, and vulnerability assessments.
Application Security Expert Opinion | Ashutosh Agrawal
Ashutosh Agrawal is an associate managing consultant at Synopsys. He specializes in penetration testing, conducting secure code reviews, and threat modeling.
Secure Design Review Expert Opinion | Anil Gajawada
Anil Gajawada is a security consultant at Synopsys. He specializes in threat modeling, secure design review, and static analysis.
Mobile Security Testing Expert Opinion | Andrew Lee-Thorp
Andrew Lee-Thorp is an associate principal consultant at Synopsys. His current focus of attention is building the tooling and process to support Synopsys' mobile testing service.
Andreas Kuehlmann, Author at Software Integrity Blog
Alyssa O’Donnell is a dedicated culture coordinator working in the computer software industry with a strong hospitality and customer service background. She is skilled in organization, event, and ...
Penetration Testing Expert Opinion | Aseem Lodha
Aseem Lodha is a security consultant specializing in penetration testing, threat modeling, architecture risk analysis, and web application security.
Mobile Penetration Testing Expert Opinion | Alagu Raman
Alagu Raman is a senior security consultant at Synopsys. He specializes in software development, secure code review, threat modeling, and mobile penetration testing.
Vulnerability Assessment Expert Opinion | Antionette Parnther
Antionette Parnther is a security consultant at Synopsys. She works with consumers on vulnerability assessments, secure code reviews, and security architecture reviews.
Thick Client Application Security Expert Opinion | Apoorva Patankar
Apoorva Patankar is a security consultant at Synopsys who specializes in automated and manual penetration testing of web, mobile, and thick client applications.
Secure Design and Architecture Expert Opinion | Anupam Mehta
Anupam Mehta is a security consultant at Synopsys. He specializes in web application security. He also works to provide consulting services in secure design, architecture, and deployment of ...