Software Integrity

We’ve got some Black Friday advice for retailers and shoppers who want to keep everyone’s data safe and secure, for a truly happy holiday season.

Continue Reading...

Are you thinking about container security? Traditional application security isn’t meant for container deployments. Learn strategies for securing your containers.

Continue Reading...

This post is the Synopsys Cybersecurity Research Center’s (CyRC) analysis of CVE-2018-18907, an authentication bypass vulnerability in the D-Link DIR-850L wireless router.

Continue Reading...

The Consumer Data Protection Act (as outlined in the CDPA draft circulated in early November by Sen. Ron Wyden) might not send CEOs to jail, but it will certainly help protect Americans’ data.

Continue Reading...

Ahead of the upcoming shopping season, we’re spreading awareness of potential Black Friday and Cyber Monday security concerns affecting people who shop and sell online.

Continue Reading...

Election security requires that voters trust the results. But many U.S. electronic voting systems are clearly insecure, and untrustworthy. What are we doing about it?

Continue Reading...

Explore 10 critical cloud security threats: data breaches, human error, data loss, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws.

Continue Reading...

Research shows that if you’re new to the cloud, you’re probably less familiar with the shared responsibility model—and less likely to be proactive in securing your cloud deployment. What is the shared responsibility model? And are you opening yourself up to the risk of data breach without even knowing it? If you’re new to the […]

Continue Reading...

Today’s software contains on average more than 50% open source. That’s why organizations with foresight are including software composition analysis in their security plans. FLIGHT East 2018 was full of tips, techniques, applications, and solutions for open source security. Here are some of the presentations. Today’s software contains significant amounts of open source, on average […]

Continue Reading...

In Dark Reading’s on-demand webinar with Brad Causey (Zero Day Consulting) and Meera Rao (Synopsys), you’ll learn about 10 emerging enterprise application security threats to be aware of.

Continue Reading...