Smart, Secure Everything from Silicon to Software
Synopsys Email Subscription Center Request Form | Register Form
Blast From the Past: 15-year-old Security Hole Hits Websites | Synopsys
A flaw in Httpoxy, first disclosed 15-years ago, has resurfaced and potentially leaves server-side website software open to hijackers.
2015 Cyber Security Breaches That Will Live In Infamy | Synopsys
Join us as we explore three cyber security breaches that made waves in 2015, and what they mean for the future of security.
What to Look Forward to at the 2017 Medical Device Security 101 Conference | ...
Ensuring that healthcare providers, medical device manufacturers, and industry regulators are knowledgeable about security threats.
10 critical cloud security threats in 2018 and beyond | Synopsys
Explore 10 critical cloud security threats: data breaches, human error, data loss, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws.
2017 Coverity Scan Report: Examining open source security and the road ahead ...
The 2017 Coverity Scan report examines OSS project risk, initiatives form the Linux Foundation, and the future of open source software. Learn more.
OWASP Top 10—A7: Request for removal and replacement | Synopsys
Proposed entry “A7 - Insufficient Attack Protection” is a potentially dangerous addition to the 2017 OWASP Top 10 Application Security Risks list.
Cyber security breaches nearly doubled in 2017 (and many were easily ...
A few reasons for the increase are that attackers are getting better, tools are getting more sophisticated, and the attack surface continues to grow.
Have you taken the 2017 Software Quality and Security Survey?
Are you involved in software security and/or development within your organization? Take the software quality and security survey today. Submit your input by 8/25 for your chance to win a $200 ...