2019 OSSRA webinar: Trends in usage and risk management | Synopsys
In our 2019 OSSRA webinar, Tim Mackey discusses trends in open source usage and risk management from the latest OSSRA report. Watch the recording now.
3 reasons to join us at FLIGHT Boston 2019 | Synopsys
At FLIGHT Boston 2019, we’ll have two full-day product training sessions, tracks in AppSec, open source, and DevOps and cloud, and plenty of networking.
The 4 Most Important Secure Development Disciplines | Synopsys
Building security into their DevOps culture by following 4 development disciplines enables Dynatrace to focus on secure software & product development.
Life-forms descend on Leipzig #34C3: Chaos Communication Congress
At the 34th Chaos Communication Congress (#34C3), life-forms descended on Leipzig to encourage people to use technology to make the world better. Or TUWAT.
4 Risks in connected cars: security implications of open source | Synopsys
At Flight Amsterdam I led a panel discussion on the security implications of open source in connected cars, joined by Gordon Haff and Simon Gutteridge.
Online safety tips to promote within your company | Synopsys
Raise security awareness in your organization. You’ll protect your employees and your business. Get started with these online safety tips.
5 DevSecOps essentials and how to achieve them | Synopsys
Embracing a DevSecOps practice requires key cultural and practical changes to integrate security into the SDLC. Learn about the 5 essentials for DevSecOps.
Introducing the 2018 CISO Report: A Q&A with Gary McGraw | Synopsys
We recently sat down with Dr. Gary McGraw to discuss his latest research effort around the CISO role. Learn more about the findings in a new report.
The 5 Pillars of a Successful Threat Model | Synopsys
Threat modeling identifies risks and flaws affecting a system.Here are 5 primary activities to perform when creating or updating a threat model.
5 Reasons to Outsource Your Authentication Like You Do Your Credit Card ...
Implementing 1 or more of the providers doesn’t make security considerations go away, nor does it even make your application safe.