Software Integrity Blog

Data privacy laws drive urgency to create a data security strategy

With the introduction of more data privacy laws, companies can use a data security strategy and framework to help them achieve better compliance.

Continue Reading...

How to achieve MISRA and AUTOSAR coding compliance

Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security in automotive software.

Continue Reading...

Code Dx brings game-changing capabilities to Synopsys

Synopsys acquires Code Dx to extend application security portfolio. Code Dx adds software vulnerability correlation, prioritization, and consolidated risk reporting.

Continue Reading...

CyRC Vulnerability Advisory: Denial of service vulnerabilities in RabbitMQ, EMQ X, and VerneMQ

CVE-2021-22116, CVE-2021-33175, and CVE-2021-33176 are denial of service vulnerabilities in three popular open source message broker applications.

Continue Reading...

Web application security testing at scale with Coverity SAST

With the rise of cyber attacks on web apps, organizations require AST tools that can help manage web application security and compliance.

Continue Reading...

Announcing Synopsys as an OpenChain Project third-party certifier

Synopsys can measure the maturity of security activities within an open source management framework in compliance with the OpenChain standard and ISO/IEC 5230:2020.

Continue Reading...

Addressing 5G security with threat modeling

5G introduces security concerns but threat modeling can help you make better informed decisions about your application security risks.

Continue Reading...

Seeker and Red Hat: Security and speed come together

Learn how the Seeker and Red Hat integration helps deliver security and speed of software development for container-based apps.

Continue Reading...

A CISO’s guide to sensitive data protection

As companies become more digitized, they must take appropriate steps in their application security processes to ensure data protection.

Continue Reading...

How to protect your Wi-Fi devices from new FragAttacks vulnerabilities

Learn about the new FragAttacks vulnerabilities that affect nearly all Wi-Fi devices and how Synopsys Defensics FuzzBox test suites can help.

Continue Reading...