Software Integrity Blog

Reduce open source risk in M&A with software due diligence

The vast majority of today’s applications are made up of open source components. The 2021 “Open Source Security and Risk Analysis” (OSSRA) report, conducted by the Synopsys Cybersecurity Research Center (CyRC), found that 75% of the 1,500+ codebases analyzed were composed of open source.

Continue Reading...

Ransomware prevention begins with securing your applications

Ransomware prevention measures such as securing your applications can help you avoid becoming the next target.

Continue Reading...

Data privacy laws drive urgency to create a data security strategy

With the introduction of more data privacy laws, companies can use a data security strategy and framework to help them achieve better compliance.

Continue Reading...

How to achieve MISRA and AUTOSAR coding compliance

Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security in automotive software.

Continue Reading...

Code Dx brings game-changing capabilities to Synopsys

Synopsys acquires Code Dx to extend application security portfolio. Code Dx adds software vulnerability correlation, prioritization, and consolidated risk reporting.

Continue Reading...

CyRC Vulnerability Advisory: Denial of service vulnerabilities in RabbitMQ, EMQ X, and VerneMQ

CVE-2021-22116, CVE-2021-33175, and CVE-2021-33176 are denial of service vulnerabilities in three popular open source message broker applications.

Continue Reading...

Web application security testing at scale with Coverity SAST

With the rise of cyber attacks on web apps, organizations require AST tools that can help manage web application security and compliance.

Continue Reading...

Announcing Synopsys as an OpenChain Project third-party certifier

Synopsys can measure the maturity of security activities within an open source management framework in compliance with the OpenChain standard and ISO/IEC 5230:2020.

Continue Reading...

Addressing 5G security with threat modeling

5G introduces security concerns but threat modeling can help you make better informed decisions about your application security risks.

Continue Reading...

Seeker and Red Hat: Security and speed come together

Learn how the Seeker and Red Hat integration helps deliver security and speed of software development for container-based apps.

Continue Reading...