We’ve got some Black Friday advice for retailers and shoppers who want to keep everyone’s data safe and secure, for a truly happy holiday season.
Are you thinking about container security? Traditional application security isn’t meant for container deployments. Learn strategies for securing your containers.
This post is the Synopsys Cybersecurity Research Center’s (CyRC) analysis of CVE-2018-18907, an authentication bypass vulnerability in the D-Link DIR-850L wireless router.
The Consumer Data Protection Act (as outlined in the CDPA draft circulated in early November by Sen. Ron Wyden) might not send CEOs to jail, but it will certainly help protect Americans’ data.
Ahead of the upcoming shopping season, we’re spreading awareness of potential Black Friday and Cyber Monday security concerns affecting people who shop and sell online.
Election security requires that voters trust the results. But many U.S. electronic voting systems are clearly insecure, and untrustworthy. What are we doing about it?
Explore 10 critical cloud security threats: data breaches, human error, data loss, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws.
Research shows that if you’re new to the cloud, you’re probably less familiar with the shared responsibility model—and less likely to be proactive in securing your cloud deployment. What is the shared responsibility model? And are you opening yourself up to the risk of data breach without even knowing it? If you’re new to the […]
Today’s software contains on average more than 50% open source. That’s why organizations with foresight are including software composition analysis in their security plans. FLIGHT East 2018 was full of tips, techniques, applications, and solutions for open source security. Here are some of the presentations. Today’s software contains significant amounts of open source, on average […]
In Dark Reading’s on-demand webinar with Brad Causey (Zero Day Consulting) and Meera Rao (Synopsys), you’ll learn about 10 emerging enterprise application security threats to be aware of.
Get the latest Software Integrity news, thought leadership, and more.