AAMI TIR57 recognized by the FDA as a foundational cybersecurity standard for...
The AAMI TIR57 "Principles for medical device security - Risk management" standard was published by AAMI this summer.
3 Ways Abuse Cases Can Drive Security Requirements | Synopsys
Learn how to use abuse cases effectively to improve the security of an application's business features.
Abuse cases: How to think like a hacker | Synopsys
There are no protections in place to help developers anticipate what a malicious user might do with a feature. There should be.
Learn how to accelerate your agile security strategy | Synopsys
Find the most aerodynamic way to build security into agile development with a variety of tools that effectively meet your firm's challenges.
'Active defense' is irresponsible | Software Integrity Blog
A look at the idea of “Active Defense”, which basically boils down to attacking the people who (may have) attacked you. Is it irresponsible?
Achieving Open Source Security in Container Environments | Synopsys
How do you achieve open source security in containers? Companies need to have an understanding of the components and dependencies in their container images.
Adobe Flash flaw compromises 'kid-friendly' tablet | Synopsys
A newly disclosed Adobe Flash security flaw allows remote hackers to follow a LeapFrog user's activity, activate the built-in microphone, and take pictures using the device's camera.
Add Security to Your SDLC With This Handy Checklist | Synopsys
This checklist will guide you throughout the development journey to assure that you’re integrating security into each of the seven SDLC artifacts.
Adding Security to your Agile Development Process | Synopsys
An examination of the security steps that should be added to your Agile development process and determining the best way to add them.
What’s the difference between Agile, CI/CD, and DevOps? | Synopsys
We've been seeing a lot of instances recently where Agile, CI/CD, and DevOps are used interchangeably. The truth is that they're actually rather different.