Learn How the Agile Security Manifesto Guides Secure Development | Synopsys
Learn how adding these 4 principles to the Agile Manifesto and your own process can help integrate critical security measures in a natural, efficient way.
Agile vs. security: Resolving the culture clash | Synopsys
When considering the clash that often results from agile vs. security, it's important to see that there's a difference between being agile and doing agile.
Agile Software Development Tricks for the Security Savvy | Synopsys
Waiting for the agile fad to pass? Agile software development is here to stay and is being adopted by organizations of all sizes.
Agile Methodology and Application Security | Synopsys
Agile methodology and application security are often spoken of together as oil and water, but are they really?
Android Full-Disk Encryption Flaw May Have Been Previously Known to Google | ...
1.4 Billion Android Devices Vulnerable to Hijack Attacks | Synopsys
Roughly 80 percent of all Android devices contain a Linux vulnerability that affect unencrypted communications and allow attackers to hijack data.
An OWASP interaction model | Software Integrity
The OWASP board decided to support a partnership model with private industry. See how this model may work to shape existing OWASP assets.
Improper Input Flaw Affects Most Android Phones | Synopsys
Security researchers disclosed that a Qualcomm flaw that may expose users' text messages, call histories, and possibly other sensitive data.
AGPL: Out of the Shadows - the Affero GPL 3 | Synopsys
Shortly after the release of GPL3, the FSF released Affero GPL 3, or AGPL. There were two philosophical camps in drafting GPL3: one that GPL3 incorporate new conditions to close the “SAAS loophole”...
Since a WebView is a browser control in an app, it invites traditional attacks associated with the web. We examine how to protect against these attacks.