Software Integrity

Author Archive

Synopsys Editorial Team

synedt


Posts by Synopsys Editorial Team:

 

Webinar: Ensure your software is secure without clogging up the CI/CD pipeline

While software grows more complex and the pace of development accelerates, the stakes for building secure software have never been higher. If you’re like most teams embracing a DevOps culture, you’re focused on breaking down silos, streamlining workflows, and cranking out functional software at a nearly continuous clip. Amid all these fundamental changes, how do […]

Continue Reading...

Posted in CI/CD, DevOps, Software Composition Analysis, Static Analysis (SAST) | No Comments »

 

Here are the answers to the most frequently asked questions about GDPR

What is GDPR? In January 2012, the European Commission (EC) in Brussels proposed a reform of the European Union’s (EU’s) 1995 data protection rules to “make Europe fit for the digital age.” New technologies and globalization have had a profound impact on how information is collected, accessed, and used. Furthermore, the 27 EU member states […]

Continue Reading...

Posted in Application Security, Security Standards and Compliance | No Comments »

 

Webinar: What will GDPR requirements mean for your security initiative?

If your organization competes in the global market, expect GDPR to have a critical influence on the software that powers your business. Having a disciplined software security strategy will help you not only identify, remediate, and prevent vulnerabilities in your software but also avoid violating GDPR. Listen as experts Adam Brown of Synopsys and legal […]

Continue Reading...

Posted in Security Standards and Compliance | No Comments »

 

Maximize your Embedded World 2018 experience with Elevate

Attending Embedded World 2018? Join us at Elevate 2018 Wednesday, February 28, 2018, from 5 to 10 p.m. CET for an evening of networking, entertainment, and enlightening discussion about the state of cyber security. Elevate keynote and panel discussion International security blogger Graham Cluley will be joining us as the evening’s keynote speaker. His presentation […]

Continue Reading...

Posted in Application Security, Featured, Security Conference or Event | No Comments »

 

Infographic: What do the 4 CISO tribes say about software security in your firm?

  Where does software security really fit into your firm? We recently decided to conduct a study to find out. Gathering data in a series of in-person interviews with 25 chief information security officers (CISOs), our aim was to understand their strategies and approaches. The 2018 CISO Report presents the research findings. From the findings, […]

Continue Reading...

Posted in Application Security, CISO | Comments Off on Infographic: What do the 4 CISO tribes say about software security in your firm?

 

Webinar: How does new CISO research affect your organization?

Chief information security officers (CISOs) play a critical role in our software-driven world, but the role is still relatively new. What CISOs do on a daily basis—and why—has largely remained a mystery—at least until we studied them in the wild. The 2018 CISO Report identifies four distinct approaches to the CISO role. Join us as […]

Continue Reading...

Posted in CISO | Comments Off on Webinar: How does new CISO research affect your organization?

 

Infographic: A lack of software security training puts companies at risk

An old proverb states that if you give a man a fish, you feed him for a day; but, if you teach a man to fish, you feed him for life. Software security training aligns very well with this proverb. The majority of developers don’t come equipped with security skills. In fact 95% of software […]

Continue Reading...

Posted in Security Training | Comments Off on Infographic: A lack of software security training puts companies at risk

 

Introducing the 2018 CISO Report: A Q&A with Gary McGraw

We recently sat down with Synopsys VP of security technology, Dr. Gary McGraw, to discuss his latest research effort. In addition to the annual Building Security In Maturity Model (BSIMM), Gary has set out to identify the ways in which CISOs approach their job role. The CISO project team, which included Sammy Migues and Dr. […]

Continue Reading...

Posted in CISO, Maturity Model (BSIMM) | Comments Off on Introducing the 2018 CISO Report: A Q&A with Gary McGraw

 

Learn how to scale threat modeling with a pattern-based strategy

Performing threat modeling is a difficult and expensive undertaking for most firms. And, understandably. Traditionally, threat modeling requires an experienced security architect with knowledge in three fundamental areas. Architecture and design patterns Enterprise application technologies Security controls and best practices When creating a scalable threat model, it’s important to recognize the benefits and limitations of […]

Continue Reading...

Posted in Application Security, Threat Modeling | Comments Off on Learn how to scale threat modeling with a pattern-based strategy

 

Get the latest resource helping development teams overcome widespread challenges

Only when security is treated with the same importance as quality can your software’s integrity drive a proactive strategy rather than a reactive response. In addition to ensuring software quality, development teams are under increasing pressure to address software security concerns. The high-profile data breaches that continuously arise are raising awareness of security issues. Because […]

Continue Reading...

Posted in Application Security, Dynamic Analysis (DAST), Fuzz Testing, Interactive Application Security Testing (IAST), Security Training, Software Quality, Static Analysis (SAST) | Comments Off on Get the latest resource helping development teams overcome widespread challenges