2019 OSSRA webinar: Trends in usage and risk management | Synopsys
https://www.synopsys.com/blogs/software-security/2019-ossra-webinar/
In our 2019 OSSRA webinar, Tim Mackey discusses trends in open source usage and risk management from the latest OSSRA report. Watch the recording now.
3 reasons to join us at FLIGHT Boston 2019 | Synopsys
https://www.synopsys.com/blogs/software-security/3-reasons-flight-boston-2019/
At FLIGHT Boston 2019, we’ll have two full-day product training sessions, tracks in AppSec, open source, and DevOps and cloud, and plenty of networking.
The 4 Most Important Secure Development Disciplines | Synopsys
https://www.synopsys.com/blogs/software-security/4-important-secure-development-disciplines/
Building security into their DevOps culture by following 4 development disciplines enables Dynatrace to focus on secure software & product development.
Life-forms descend on Leipzig #34C3: Chaos Communication Congress
https://www.synopsys.com/blogs/software-security/34c3-chaos-communication-congress/
At the 34th Chaos Communication Congress (#34C3), life-forms descended on Leipzig to encourage people to use technology to make the world better. Or TUWAT.
4 Risks in connected cars: security implications of open source | Synopsys
https://www.synopsys.com/blogs/software-security/4-risks-connected-cars/
At Flight Amsterdam I led a panel discussion on the security implications of open source in connected cars, joined by Gordon Haff and Simon Gutteridge.
Online safety tips to promote within your company | Synopsys
https://www.synopsys.com/blogs/software-security/4-online-safety-tips/
Raise security awareness in your organization. You’ll protect your employees and your business. Get started with these online safety tips.
5 DevSecOps essentials and how to achieve them | Synopsys
https://www.synopsys.com/blogs/software-security/5-essentials-devsecops-world/
Embracing a DevSecOps practice requires key cultural and practical changes to integrate security into the SDLC. Learn about the 5 essentials for DevSecOps.
Introducing the 2018 CISO Report: A Q&A with Gary McGraw | Synopsys
https://www.synopsys.com/blogs/software-security/2018-ciso-report/
We recently sat down with Dr. Gary McGraw to discuss his latest research effort around the CISO role. Learn more about the findings in a new report.
The 5 Pillars of a Successful Threat Model | Synopsys
https://www.synopsys.com/blogs/software-security/5-pillars-successful-threat-model/
Threat modeling identifies risks and flaws affecting a system.Here are 5 primary activities to perform when creating or updating a threat model.
5 Reasons to Outsource Your Authentication Like You Do Your Credit Card ...
https://www.synopsys.com/blogs/software-security/5-reasons-outsource-authentication/
Implementing 1 or more of the providers doesn’t make security considerations go away, nor does it even make your application safe.