Software Integrity Blog

Author Archive

Jim Ivers

jivers

Jim Ivers is the senior director of marketing within Synopsys' Software Integrity Group where he leads all aspects of SIG's global marketing strategies, branding initiatives, and programs, as well as product management and product marketing. Jim is a 30-year technology veteran who has spent the last ten years in IT security. Prior to Synopsys, Jim was the CMO at companies such as Cigital, Covata, Triumfant, Vovici, and Cybertrust, a $200M security solutions provider that was sold to Verizon Business. Jim also served as VP of Marketing for webMethods and VP of Product Management for Information Builders.


Posts by Jim Ivers:

 

Synopsys named a leader in the 2019 Gartner MQ for Application Security Testing—3 years running

In the 2019 Gartner Magic Quadrant for Application Security Testing, Synopsys leads the field for our ability to execute and our completeness of vision.

Continue Reading...

Posted in News & Announcements | Comments Off on Synopsys named a leader in the 2019 Gartner MQ for Application Security Testing—3 years running

 

Open source vulnerabilities: Are you prepared to run the race?

Originally posted on SecurityWeek. 

Continue Reading...

Posted in Data Breach, Open Source Security, Software Composition Analysis | Comments Off on Open source vulnerabilities: Are you prepared to run the race?

 

IoT security: Where there is smoke, there is fire

Originally posted on SecurityWeek. 

Continue Reading...

Posted in Internet of Things | Comments Off on IoT security: Where there is smoke, there is fire

 

How to reduce risk while saving on the cost of resolving security defects

Originally posted on SecurityWeek. 

Continue Reading...

Posted in Maturity Model (BSIMM) | Comments Off on How to reduce risk while saving on the cost of resolving security defects

 

Sobering thoughts when a connected medical device is connected to you

Originally posted on SecurityWeek. 

Continue Reading...

Posted in Healthcare Security, Medical Device Security | Comments Off on Sobering thoughts when a connected medical device is connected to you

 

The connected toy conundrum is beginning to boil

Originally posted on SecurityWeek. 

Continue Reading...

Posted in Internet of Things | Comments Off on The connected toy conundrum is beginning to boil

 

Moving beyond ‘moving left’: The case for developer enablement

Originally posted on SecurityWeek. 

Continue Reading...

Posted in General, Security Training, Static Analysis (SAST) | Comments Off on Moving beyond ‘moving left’: The case for developer enablement

 

Make a new year’s resolution to get serious about software security

Originally posted on SecurityWeek. 

Continue Reading...

Posted in General | Comments Off on Make a new year’s resolution to get serious about software security

 

If you’re only as strong as your allies, should you trust third-party code?

Originally posted on SecurityWeek

Continue Reading...

Posted in General, Open Source Security | Comments Off on If you’re only as strong as your allies, should you trust third-party code?

 

A spell check equivalent for building security in

Originally posted on SecurityWeek

Continue Reading...

Posted in Agile, CI/CD & DevOps, Security Training, Static Analysis (SAST) | Comments Off on A spell check equivalent for building security in