Software Integrity Blog

Archive for the 'Events' Category

 

We’re going to RSA 2019. Want to join us?

We’re going to RSA 2019 in San Francisco, and we’d love to see you at our booth. Or at our annual networking mixer. Or at our presentation. Come see us!

Continue Reading...

Posted in Events

 

Black Duck by Synopsys FLIGHT East 2018 presentations

Most software today contains open source. That’s why you need software composition analysis. See open source security presentations from FLIGHT East 2018.

Continue Reading...

Posted in Events, Open Source Security

 

GovWare 2018 survey: Challenges include resources and open source use

In September 2018, Synopsys Software Integrity Group, Asia Pacific, participated in the 27th edition of GovernmentWare. The GovWare conference anchors Singapore International Cyber Week, which promotes the development and innovation of the cyber ecosystem through international and regional collaboration and cooperation. SICW draws thousands of cyber security practitioners from around the world, and this year […]

Continue Reading...

Posted in Events, Software Security Initiative (SSI)

 

Codenomi-con speakers agree: Bringing back privacy requires citizen action

We keep hearing that privacy is dead. But there is a good chance that a lot of us still aren’t aware of just how dead. So this week Synopsys presented codenomi-con, in connection with the Black Hat conference in Las Vegas, offering reminders about that reality in both government and the private sector. At the […]

Continue Reading...

Posted in Events, Healthcare Security, Privacy, Webinars

 

Electoral trust meets software security

It’s fair to say that regardless of where you live, assuming you have democratic elections, you want your vote to count—without any form of external influence or tampering. It’s also fair to say that until the most recent election cycle, for many Americans, election tampering was pretty low on their list of things to worry […]

Continue Reading...

Posted in Events

 

Security IRL at RSA Conference 2018

We took the opportunity at RSA Conference last month to survey our booth visitors about their organizations’ application security programs. We’ve sponsored and conducted a number of surveys on topics ranging from DevSecOps to open source security to medical device security, but there’s something about collecting feedback from conference attendees in person that really hits home—a […]

Continue Reading...

Posted in Data Breach, Events, Infographic

 

RSA news, Israel shifts to open source, latest on TaskRabbit breach

RSA happened last week, and a ton of news—some gloomy, some encouraging—has come from the world’s largest cyber security conference. The Israeli government follows Great Britain, the U.S., and France and moves to open source. TaskRabbit pledges “more security” after a data breach, and nine things you can expect to have an impact on cyber […]

Continue Reading...

Posted in Agile, CI/CD & DevOps, Data Breach, Events, Open Source Security

 

Behavioral security at RSA Conference 2018

Wednesday, RSA 2018: On any given day, there are more than 150 sessions to choose from here. Good luck getting to even 5% of those. The good news is that attendees can get access to most of the sessions they missed after the fact, since the slide presentations are posted and videos are made of […]

Continue Reading...

Posted in Automotive Security, Events, Medical Device Security, Red Teaming

 

RSA day 2: Cloudy forecast with some sunny breaks

It was mostly sunny outside RSA Conference 2018 in San Francisco during the opening keynotes on Tuesday. Inside? Well, there were some sunny breaks, but plenty of clouds as well. It started sunny, when RSA president Rohit Ghai acknowledged the clouds but chose to focus on “Three Silver Linings.” “I’m not in denial,” he said. […]

Continue Reading...

Posted in Events

 

Demystifying Android’s SafetyNet Attestation at Black Hat Europe 2017

Many app developers have questions like “Is the device my app runs on reliable? Is it trustworthy? Could it be ‘rooted’?” Answering questions such as these can be difficult. In an area traditionally dominated by root detection products and DIY techniques, Google attempts to respond to this request: “OK Google, what do you think about […]

Continue Reading...

Posted in Events, Mobile Application Security