8 Takeaways from NIST’s Application Container Security Guide | Synopsys
NIST published the “Application Container Security Guide” in September to address security risks associated with container adoption. Read 8 key takeaways.
A Methodology for Quantifying Risks from Web Services | Synopsys
How do you quantify the risks from usage of Web Services that make calls to various APIs available commercially and in public domain for “free” usage?
9 highlights from the 2018 Software Integrity blog | Synopsys
From vulnerability detection to API security, these nine topics hit the highlights from our coverage of software security and quality this year.
Learn how to accelerate your agile security strategy | Synopsys
Find the most aerodynamic way to build security into agile development with a variety of tools that effectively meet your firm's challenges.
Abuse cases: How to think like a hacker | Synopsys
There are no protections in place to help developers anticipate what a malicious user might do with a feature. There should be.
Adding Security to your Agile Development Process | Synopsys
An examination of the security steps that should be added to your Agile development process and determining the best way to add them.
Add Security to Your SDLC With This Handy Checklist | Synopsys
This checklist will guide you throughout the development journey to assure that you’re integrating security into each of the seven SDLC artifacts.
'Active defense' is irresponsible | Software Integrity Blog
A look at the idea of “Active Defense”, which basically boils down to attacking the people who (may have) attacked you. Is it irresponsible?
Adobe Flash Flaw Compromises 'Kid-Friendly' Tablet | Synopsys
A newly disclosed software flaw allows remote hackers to follow user activity, activate in-built microphone, and take pictures using the device's camera.
IAST defined, plus the advantages of IAST for business-critical software
As an acronym, IAST is awkward to pronounce or to guess what it stands for. But as a testing tool, IAST is remarkably effective at rooting out potentially catastrophic bugs in web-based ...