Software Integrity Blog

Search Results for 'embedded'

 

Maximize your Embedded World 2018 experience with Elevate

Attending Embedded World 2018? Join us at Elevate 2018 Wednesday, February 28, 2018, from 5 to 10 p.m. CET for an evening of networking, entertainment, and enlightening discussion about the state of cyber security. Elevate keynote and panel discussion International security blogger Graham Cluley will be joining us as the evening’s keynote speaker. His presentation […]

Continue Reading...

Posted in Webinars

 

Embedded World and CodenomiCON Europe 2017 will kick your IoT security into high gear

Each year the Embedded World Exhibition and Conference in Nuremberg offers the embedded community an opportunity to gather information about new products and innovations, and to develop valuable contacts with others in the industry. An estimated 930 exhibitors will be presenting state-of-the-art embedded technologies at this year’s event. Embedded World Conference 2017 Join us in […]

Continue Reading...

Posted in Internet of Things, Webinars

 

Synopsys joins automakers at Embedded Software Summit

This week Synopsys presented to automakers gathered in Detroit at a summit on embedded software integrity. The Embedded Software Integrity for Automotive Summit convened at a small hotel in Dearborn, Michigan – a city located just outside of Detroit and known by many in the automotive industry as the home of the Ford Motor Company […]

Continue Reading...

Posted in Automotive Security

 

President’s ‘cybersecurity moonshot’: Transformational or pie in the sky?

Making the internet safe and secure in 10 years isn’t going to be easy, if it’s even possible. And that’s why NSTAC’s new proposal is a cyber security moonshot.

Continue Reading...

Posted in Critical Infrastructure Security, Government Security

 

Better passwords in California won’t help much

California is all done with weak passwords. Well, not right now, but it says it will be done with them for internet-connected devices in another 14 months—starting Jan. 1, 2020. From then on, the Information Privacy: Connected Devices bill, signed earlier this month by Gov. Jerry Brown, will require each such device to have a […]

Continue Reading...

Posted in Internet of Things, Legal, Security Standards and Compliance

 

GovWare 2018 survey: Challenges include resources and open source use

In September 2018, Synopsys Software Integrity Group, Asia Pacific, participated in the 27th edition of GovernmentWare. The GovWare conference anchors Singapore International Cyber Week, which promotes the development and innovation of the cyber ecosystem through international and regional collaboration and cooperation. SICW draws thousands of cyber security practitioners from around the world, and this year […]

Continue Reading...

Posted in Events, Software Security Initiative (SSI)

 

Porous portals, Newegg is a broken egg, and Mirai’s creators have new hats

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Security Mashup. What’s in this week’s Security Mashup, you ask? Porous payment portals lead to government data breaches, Magecart pwns Newegg, and the Mirai creators trade in their black hats for white ones. Watch this week’s […]

Continue Reading...

Posted in Data Breach, Government Security, Weekly Security Mashup

 

The IoT within us: Network-connected medical devices

The Internet of Things is all around us. But it doesn’t stop there—now it’s inside us too. As the era of “connected everything” explodes, so does the use of network-connected medical devices. These interconnected devices, ranging from hospital imaging equipment to implantable pacemakers to infusion pumps, help healthcare providers and patients in a variety of […]

Continue Reading...

Posted in Healthcare Security, Infographic, Internet of Things, Medical Device Security

 

Webinar: Using Security Champions to build a DevSecOps culture within your organization

In our on-demand webinar with Brendan Sheairs (Synopsys), you’ll learn about the fundamentals and challenges of building a Security Champions program to transform DevOps into DevSecOps.

Continue Reading...

Posted in Agile, CI/CD & DevOps, Security Training, Webinars

 

Securing applications with Coverity’s static analysis results

This is the third post in a three-part series on how you can maximize the impact of a static analysis solution by supporting developers and their goals. As discussed in previous posts, developers are more likely to use SAST tools to improve application security when they integrate seamlessly into existing development workflows. While integration into […]

Continue Reading...

Posted in Agile, CI/CD & DevOps, Static Analysis (SAST)