Software Integrity Blog

Author Archive

Jim Ivers

jivers

Jim Ivers is the senior director of marketing within Synopsys' Software Integrity Group where he leads all aspects of SIG's global marketing strategies, branding initiatives, and programs, as well as product management and product marketing. Jim is a 30-year technology veteran who has spent the last ten years in IT security. Prior to Synopsys, Jim was the CMO at companies such as Cigital, Covata, Triumfant, Vovici, and Cybertrust, a $200M security solutions provider that was sold to Verizon Business. Jim also served as VP of Marketing for webMethods and VP of Product Management for Information Builders.


Posts by Jim Ivers:

 

The latest must-have car accessory: Security

Originally posted on SecurityWeek

Continue Reading...

Posted in Internet of Things | Comments Off on The latest must-have car accessory: Security

 

Embracing the security benefits of the cloud infrastructure

Originally posted on SecurityWeek

Continue Reading...

Posted in Cloud Security | Comments Off on Embracing the security benefits of the cloud infrastructure

 

How connected cars are driving greater security concerns

Originally posted on SecurityWeek

Continue Reading...

Posted in Internet of Things | Comments Off on How connected cars are driving greater security concerns

 

The IoT sky is falling: How being connected makes us insecure

Originally posted on SecurityWeek

Continue Reading...

Posted in Cloud Security, Internet of Things | Comments Off on The IoT sky is falling: How being connected makes us insecure

 

Are your applications really protected? It’s all about the pivot

Originally posted on SecurityWeek

Continue Reading...

Posted in Agile, CI/CD & DevOps | Comments Off on Are your applications really protected? It’s all about the pivot

 

Security: A true crown jewel of software

Originally posted on SecurityWeek

Continue Reading...

Posted in Agile, CI/CD & DevOps | Comments Off on Security: A true crown jewel of software

 

Mythbusting: How good security practices complement developer productivity

Originally posted on SecurityWeek

Continue Reading...

Posted in Agile, CI/CD & DevOps, Static Analysis (SAST) | Comments Off on Mythbusting: How good security practices complement developer productivity

 

ATMs to IoT: The generational divide of digital trust

Originally posted on SecurityWeek

Continue Reading...

Posted in Data Breach, Financial Services Security, Internet of Things, Maturity Model (BSIMM) | Comments Off on ATMs to IoT: The generational divide of digital trust

 

SAST and DAST: Part of a balanced software security initiative

Originally posted on SecurityWeek

Continue Reading...

Posted in General, Static Analysis (SAST), Web Application Security | Comments Off on SAST and DAST: Part of a balanced software security initiative

 

Building security into IoT software development

IoT will create a surge in software development that will be unprecedented in scope and reach. Why? It’s simple.

Continue Reading...

Posted in Internet of Things | Comments Off on Building security into IoT software development