Views on the 30-Day Data Breach Notification Laws
This week there has been much conversation around President Obama’s proposed law calling for organizations to publically disclose breaches within 30 days.
2019 software security predictions: AI, IoT, and more | Synopsys
Our experts share their 2019 software security predictions about AI/machine learning, design and standards, cloud adoption, and IoT, routers, and data in transit.
The 4 Most Important Secure Development Disciplines | Synopsys
Building security into their DevOps culture by following 4 development disciplines enables Dynatrace to focus on secure software & product development.
4 Risks in connected cars: security implications of open source | Synopsys
At Flight Amsterdam I led a panel discussion on the security implications of open source in connected cars, joined by Gordon Haff and Simon Gutteridge.
Life-forms descend on Leipzig #34C3: Chaos Communication Congress
At the 34th Chaos Communication Congress (#34C3), life-forms descended on Leipzig to encourage people to use technology to make the world better. Or TUWAT.
Online Safety Tips to Promote Within Your Company | Synopsys
Raise security awareness in your organization. You’ll protect your employees and your business. Get started with these online safety tips.
5 DevSecOps essentials and how to achieve them | Synopsys
Embracing a DevSecOps practice requires key cultural and practical changes to integrate security into the SDLC. Learn about the 5 essentials for DevSecOps.
5 Reasons to Outsource Your Authentication Like You Do Your Credit Card ...
Implementing 1 or more of the providers doesn’t make security considerations go away, nor does it even make your application safe.
5 things to do before your threat modeling assessment | Synopsys
Here are 5 activities to undertake before your next threat modeling assessment that will set your team and organization up for success.
The 5 Pillars of a Successful Threat Model | Synopsys
Threat modeling identifies risks and flaws affecting a system.Here are 5 primary activities to perform when creating or updating a threat model.