Software Integrity Blog

Author Archive

Haidee LeClair


Before joining the Synopsys team, Haidee worked in a variety of technical, writing, and digital marketing roles. Previously, Haidee built partner sites for Bitpipe, Inc., which was acquired by TechTarget as their white paper library system. In her spare time, she creates websites and content for friends and family, in addition to building the social media presence for their small businesses.

Posts by Haidee LeClair:


Cardiac patient data at risk, Philips reports

It’s never good news to find out that both your personal and clinical information could be compromised by the software platform your healthcare provider is using.

Continue Reading...

Posted in Healthcare Security & Privacy, Medical Device Security


5 essentials for getting your bearings in a DevSecOps world

Embracing a DevSecOps practice requires key cultural and practical changes to integrate security into the SDLC. Learn about the 5 essentials for DevSecOps.

Continue Reading...

Posted in Agile, CI/CD, & DevOps


Security IRL at RSA Conference 2018

We took the opportunity at RSA Conference last month to survey our booth visitors about their organizations’ application security programs. We’ve sponsored and conducted a number of surveys on topics ranging from DevSecOps to open source security to medical device security, but there’s something about collecting feedback from conference attendees in person that really hits home—a glimpse into security IRL, if you will. Taking a look at security IRL Most attendees (78%) reported direct roles in cybersecurity, risk management or software engineering, representing a wide range of industries. Some of the findings were far from unexpected. For example, 40% of respondents cited a lack of skilled security professionals as the biggest challenge in implementing their application security programs. We also found that a startling number of respondents didn’t even know whether their organizations were the target of a cyber attack in the last two years.

Continue Reading...

Posted in Data Breach Security