Software Integrity

Search Results for 'software security testing'

 

Software security testing

Originally published in IEEE Security and Privacy Magazine Security testing has recently moved beyond the realm of network port scanning to include probing software behavior as a critical aspect of system behavior. Unfortunately, testing software security is a commonly misunderstood task. Security testing done properly goes deeper than simple black-box probing on the presentation layer (the […]

Continue Reading...

Posted in Software Architecture and Design | Comments Off on Software security testing

 

U.S. Cybersecurity National Action Plan includes UL’s Software Testing Program

On Tuesday the White House announced its Cybersecurity National Action Plan (CNAP). It builds on the momentum to secure the government’s and the nation’s databases and use of the Internet following the passage of the Cybersecurity Act of 2015 in December and heavily leverages newly created mechanisms for private companies to share cyber threat information […]

Continue Reading...

Posted in Uncategorized | Comments Off on U.S. Cybersecurity National Action Plan includes UL’s Software Testing Program

 

Software security myth #3: Penetration testing solves everything

Security testing is important. Conducting specialized penetration tests at the end of the software development life cycle (SDLC) can be a rewarding security activity for your organization. Penetration testing is, after all, the most frequently and commonly applied of all software security practices. But, this isn’t necessarily a good thing. This is why penetration testing […]

Continue Reading...

Posted in Software Architecture and Design, Web Application Security | Comments Off on Software security myth #3: Penetration testing solves everything

 

Both consumers and retailers need to up their cyber security to make holidays happy

We’ve got some Black Friday advice for retailers and shoppers who want to keep everyone’s data safe and secure, for a truly happy holiday season.

Continue Reading...

Posted in General | Comments Off on Both consumers and retailers need to up their cyber security to make holidays happy

 

10 critical cloud security threats in 2018 and beyond

Explore 10 critical cloud security threats: data breaches, human error, data loss, insider threats, DDoS attacks, insecure APIs, exploits, account hijacking, APTs, and CPU flaws.

Continue Reading...

Posted in Cloud Security, Infographic | Comments Off on 10 critical cloud security threats in 2018 and beyond

 

Shared responsibility model: Who owns cloud security?

Research shows that if you’re new to the cloud, you’re probably less familiar with the shared responsibility model—and less likely to be proactive in securing your cloud deployment. What is the shared responsibility model? And are you opening yourself up to the risk of data breach without even knowing it? If you’re new to the […]

Continue Reading...

Posted in Cloud Security | Comments Off on Shared responsibility model: Who owns cloud security?

 

Synopsys Software Integrity Group awards for 2018

We’re thrilled when the development community recognizes us for our accomplishments. Here are a few software security awards we received this year.

Continue Reading...

Posted in General | Comments Off on Synopsys Software Integrity Group awards for 2018

 

From mainframes to connected cars: How software drives the automotive industry

The automotive industry runs on software—but with increased software use comes an increased attack surface. Making safe, reliable vehicles starts with building secure software. Dr. Gary McGraw explains the importance of secure design principles and how to take the first step toward automotive software security. The original version of this article was published in The Security […]

Continue Reading...

Posted in Automotive Security, Maturity Model (BSIMM), Software Architecture and Design | Comments Off on From mainframes to connected cars: How software drives the automotive industry

 

Want to close the software security skills gap? Tanya Janca says start mentoring!

Tanya Janca believes that one of the reasons most connected products are insecure from day one is the software security skills gap that comes from developers not learning security in school. Her solution: Those who know should teach those who don’t. Janca discusses mentoring in the software security industry with us. Tanya Janca has no […]

Continue Reading...

Posted in General | Comments Off on Want to close the software security skills gap? Tanya Janca says start mentoring!

 

Need a job? Consider a career in cyber security | NCSAM at Synopsys

Now more than ever, deciding on a career is a daunting prospect. Yes, unemployment’s at a record low, and new jobs will inevitably replace whatever jobs are lost to “progress.” But those seeking new careers now have to consider that their next career will probably not be their last one. Between artificial intelligence, robots, and […]

Continue Reading...

Posted in General | Comments Off on Need a job? Consider a career in cyber security | NCSAM at Synopsys