2017 Coverity Scan Report: Examining open source security and the road ahead ...
The 2017 Coverity Scan report examines OSS project risk, initiatives form the Linux Foundation, and the future of open source software. Learn more.
What to Look Forward to at the 2017 Medical Device Security 101 Conference | ...
Ensuring that healthcare providers, medical device manufacturers, and industry regulators are knowledgeable about security threats.
Blast From the Past: 15-year-old Security Hole Hits Websites | Synopsys
A flaw in Httpoxy, first disclosed 15-years ago, has resurfaced and potentially leaves server-side website software open to hijackers.
2015 Cyber Security Breaches That Will Live In Infamy | Synopsys
Join us as we explore three cyber security breaches that made waves in 2015, and what they mean for the future of security.
OWASP Top 10—A7: Request for removal and replacement | Synopsys
Proposed entry “A7 - Insufficient Attack Protection” is a potentially dangerous addition to the 2017 OWASP Top 10 Application Security Risks list.
Cyber security breaches nearly doubled in 2017 (and many were easily ...
A few reasons for the increase are that attackers are getting better, tools are getting more sophisticated, and the attack surface continues to grow.
Introducing the 2018 CISO Report: A Q&A with Gary McGraw | Synopsys
We recently sat down with Dr. Gary McGraw to discuss his latest research effort around the CISO role. Learn more about the findings in a new report.
Have you taken the 2017 Software Quality and Security Survey?
Are you involved in software security and/or development within your organization? Take the software quality and security survey today. Submit your input by 8/25 for your chance to win a $200 ...
Synopsys maintains leadership position in the 2018 Gartner Magic Quadrant for...
We’re ready to meet the challenges your firm is facing and support your team on the journey to more secure, higher-quality software.
We’re a 2018 NEVY Awards finalist for Cybersecurity Company of the Year | ...
We’re honored to be named a finalist for the Cybersecurity Company of the Year Award in the 2018 NEVY Awards, hosted by the New England Venture Capital Association (NEVCA) and presented by ...
4 Risks in connected cars: security implications of open source | Synopsys
At Flight Amsterdam I led a panel discussion on the security implications of open source in connected cars, joined by Gordon Haff and Simon Gutteridge.
The 3 Fundamentals of a Software Security Initiative | Synopsys
The most effective software security initiatives are tuned to fit your organization and built to scale.
The 4 Most Important Secure Development Disciplines | Synopsys
Building security into their DevOps culture by following 4 development disciplines enables Dynatrace to focus on secure software & product development.
Views on the 30-Day Data Breach Notification Laws
This week there has been much conversation around President Obama’s proposed law calling for organizations to publically disclose breaches within 30 days.
5 Reasons to Outsource Your Authentication Like You Do Your Credit Card ...
Implementing 1 or more of the providers doesn’t make security considerations go away, nor does it even make your application safe.
The 5 Pillars of a Successful Threat Model | Synopsys
Threat modeling identifies risks and flaws affecting a system.Here are 5 primary activities to perform when creating or updating a threat model.
Online Safety Tips to Promote Within Your Company | Synopsys
Raise security awareness in your organization. You’ll protect your employees and your business. Get started with these online safety tips.
5 things to do before your threat modeling assessment | Synopsys
Here are 5 activities to undertake before your next threat modeling assessment that will set your team and organization up for success.
5 Ways To Pay Your Technical Debt Back | Synopsys
Secure your software development moving forward and reduce the creation of technical debt by aligning your software supply chain.
6 months later, Spectre still haunts | Synopsys Software Integrity
It’s now more than six months since the major design flaw in computer chips labeled Spectre became public. And it's still haunting the world of information technology. For those who don’t have a ...
6 recommendations for healthcare cybersecurity | Synopsys
The Health Care Industry Cybersecurity Task Force published its recommendations this month, with six key recommendations for healthcare cybersecurity.
7 Myths Of Software Security Best Practices | Synopsys
The 7 myths of software security best practices explore how security initiatives should work, and aren’t simply about how to secure a single application.
Checklist: 7 elements of GDPR software security compliance | Synopsys
Our GDPR compliance checklist explains seven steps you can take to improve your software security initiative and illustrate GDPR software security compliance.
7 ways financial services firms can protect themselves | Synopsys
When it comes to the finance industry, there are strategies that firms can implement to lock down assets and data as securely as possible.
8 Takeaways from NIST’s Application Container Security Guide | Synopsys
NIST published the “Application Container Security Guide” in September to address security risks associated with container adoption. Read 8 key takeaways.