.NET Component Vulnerability Analysis in Production | Synopsys
Component vulnerability analysis requires access to composition metadata: build files, project files, manifests. What if these materials aren't available? Learn about .NET component vulnerability ...
'Active defense' is irresponsible | Software Integrity
A look at the idea of “Active Defense”, which basically boils down to attacking the people who (may have) attacked you. Is it irresponsible?
‘Cyber Pearl Harbor’ unlikely, but critical infrastructure security needs an ...
Officials have been warning us for decades of a “cyber Pearl Harbor” or “cyber 9/11” kind of attack on the nation’s critical infrastructure. Are we prepared?
"Easy" to hack Apache Struts vulnerability CVE-2017-9805 | Synopsys
Dozens of Fortune 100 companies at risk after security researchers at lgtm.com discovered an easy to hack critical Apache Struts security flaw.
"PoisonTap" Steals Network Passwords | Synopsys
A new exploit tool requires only 30 seconds to install a privacy-invading backdoor on a previously locked computer.
/C O R R E C T I O N - Synopsys, Inc./
#BeBoldForChange on International Women's Day 2017 | Synopsys
What better way to celebrate International Women’s Day than by reading about the women of Synopsys who are achieving great success?
1.4 Billion Android Devices Vulnerable to Hijack Attacks | Synopsys
Roughly 80 percent of all Android devices contain a Linux vulnerability that affect unencrypted communications and allow attackers to hijack data.
10 critical cloud security threats in 2018 and beyond | Synopsys
Explore 10 critical cloud security threats: data breaches, human error, data loss, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws.
10 emerging enterprise application security threats webinar | Synopsys
In Dark Reading’s on-demand webinar with Brad Causey (Zero Day Consulting) and Meera Rao (Synopsys), you’ll learn about 10 emerging enterprise application security threats to be aware of.
10 Reasons Why SMB's Need Software Security | Synopsys
Find out the top 10 reasons why your small business (SMB) needs software security. Download the infographic.
10 Things We Can Learn About AppSec From Football | Synopsys
Boost your organization's application security defense strategy. Stay offensive with these 10 lessons any organization can learn from football.
10 Ways to Infuse Security Into Your Software Development Life Cycle | Synopsys
Implementing security measures should be a top priority to ensure the success of your software development life cycle (SDLC).
100 Tapeouts Underscore Rapid and Broad Acceptance of Synopsys' In-Design ...
112 BSIMM Activities at a Glance | Synopsys
All 112 BSIMM activities are presented for anyone responsible for creating and executing a software security initiative.
12 Questions to Ask your App Testing Partner | Synopsys
Learn what questions to ask your app testing service provider to understand exactly the type of support you will receive.
16 Synopsys Technologists Recognized for Leadership in Creation of ...
19-Year-Old Gets United Airlines Bug Bounty: 1M Air Miles | Synopsys
A security researcher from Amsterdam has received a bug bounty of one million free air miles from United Airlines after reporting 20 major bugs.
2 path traversal defects in Oracle's JSF2 implementation | Synopsys
Coverity SRL discovered 2 path traversal defects in the Oracle Mojarra 2.0 and 2.1 reference implementations. Oracle assigned CVE-2013-3827 to the defects.
2004: Red Hat Linux versions 7.x, 8.x, and 9.x
Red Hat Linux versions 7.x, 8.x, and 9.x in 2004
2006: OS Platform End-of-Life – Itanium Processor
OS Platform End-of-Life – Itanium Processor in 2006
2007: Proteus products on the IA-64
2007: Proteus products on the IA-64 release notes
2015 Cyber Security Breaches That Will Live In Infamy | Synopsys
Join us as we explore three cyber security breaches that made waves in 2015, and what they mean for the future of security.
2015 security New Year's resolutions | Synopsys
With the dawn of the new year, why not take your security game to the next level? Here's how with 5 security New Year's resolutions.
2016 CES Training Videos
The "Unleashing SystemVerilog and UVM video series enables you to understand and skillfully leverage object-oriented programming in the SystemVerilog language and the industry standard Universal ...