Software Integrity Blog

Search Results for '"red hat"'


Seeker and Red Hat: Security and speed come together

Learn how the Seeker and Red Hat integration helps deliver security and speed of software development for container-based apps.

Continue Reading...

Posted in Building secure software, Interactive Application Security Testing (IAST)


[Webinars] Fuzz testing, DevOps with Red Hat, and ISO/SAE 21434

Learn about the ins and outs of fuzzing, how to secure your DevOps pipeline with Synopsys and Red Hat, and what ISO/SAE 21434 means for automotive security.

Continue Reading...

Posted in Agile, CI/CD, & DevOps, Automotive Cyber Security, Fuzz Testing, Webinars


Extending Black Duck’s capability with Red Hat OpenShift to scan Red Hat Quay images

The Black Duck Connector for OpenShift, which identifies and tags open source components, can now scan Red Hat Quay container registry images via a webhook.

Continue Reading...

Posted in Container Security, Open Source Security, Security news and research


Synopsys Software Integrity Group receives Red Hat Partner Award

Synopsys and Red Hat have established a world-class partnership to enable open source management and application security testing in container environments.

Continue Reading...

Posted in Container Security, Security news and research


Black Duck supports securing containers in Red Hat OpenShift and CRI-O

Secure containers with Black Duck OpsSight, a complementary, automated image scanning solution that supports Kubernetes and OpenShift with a CRI-O runtime.

Continue Reading...

Posted in Container Security


Synopsys and Red Hat OpenShift 4: One smooth Operator!

Building our new Synopsys Operator took some effort, but the results are impressive! Read our tips for creating your own Operator for Red Hat OpenShift.

Continue Reading...

Posted in Container Security, Open source and software supply chain risks, Open Source Security


New Synopsys Polaris platform optimized for Red Hat OpenShift Container Platform

Open source is eating software, but Red Hat and Synopsys help you build and deploy containers more securely and at scale.

Continue Reading...

Posted in Open source and software supply chain risks


Improve your AppSec program with the Synopsys partner ecosystem

Understand how the Synopsys partner ecosystem can help your organization address your software quality and application security challenges.

Continue Reading...

Posted in News & Announcements, Security news and research


Synopsys CyRC named a CVE Numbering Authority

As a CVE Numbering Authority, Synopsys can assign CVE ID numbers and publish newly discovered vulnerabilities.

Continue Reading...

Posted in Security news and research, Software Compliance, Quality & Standards, Software Security Research


[Webinars] Open source, threat modeling, Node.js security

Hear about the state of open source in our Red Hat partner webinar, discover our approach to threat modeling, and learn how to secure Node.js applications.

Continue Reading...

Posted in Open Source Security, Software Architecture & Design, Web Application Security, Webinars