The cybersecurity executive order of 2019 is meant to boost cyber security skills and improve national defense against growing cyber threats. Will it work?
Posted in Security Training | Comments Off on The cybersecurity workforce executive order: Real potential or wishful thinking?
Coding bootcamps fill development seats fast—but the trade-off for speed is security. How do you fill the security training gaps in your developers’ education?
Posted in Security Training | Comments Off on Coding bootcamps need to get real about secure coding practices
To give your team the latest cloud security training, you need a fixed core curriculum and the flexibility to customize cloud training to each person’s needs.
Posted in Cloud Security, Developer Enablement, Security Training, Webinars | Comments Off on How to get cloud security training for your team
In our on-demand webinar with Brendan Sheairs (Synopsys), you’ll learn about the fundamentals and challenges of building a Security Champions program to transform DevOps into DevSecOps.
Posted in Agile, CI/CD & DevOps, General, Security Training, Webinars | Comments Off on Webinar: Using Security Champions to build a DevSecOps culture within your organization
The latest release of Coverity by Synopsys features seamless integration with our completely rebuilt eLearning platform, an on-demand developer training solution focusing on secure coding best practices and security guidance.
On-demand developer training enables development teams
Synopsys eLearning is an outcome-driven, learner-centric training solution that makes learning about security easy, relevant, and accessible. With eLearning, learners have on-demand access to an immersive, continuous learning ecosystem that unifies security expertise, instructional design, and storytelling into an intuitive platform. Features include:
Posted in Security Training, Static Analysis (SAST) | Comments Off on Coverity now features integrated on-demand developer training
Synopsys eLearning goes beyond your typical training solution. Our course offerings provide developers with targeted training that centers specifically on the security frameworks and platforms they’re using.
Posted in Security Training | Comments Off on How effective is storytelling in eLearning courses?
Written in coordination with Prasaath Velu
Posted in Security Training | Comments Off on Synopsys eLearning empowers developers to achieve security compliance with security competency
An old proverb states that if you give a man a fish, you feed him for a day; but, if you teach a man to fish, you feed him for life. Software security training aligns very well with this proverb.
Posted in General, Security Training | Comments Off on A lack of software security training puts companies at risk
Only when security is treated with the same importance as quality can your software’s integrity drive a proactive strategy rather than a reactive response.
In addition to ensuring software quality, development teams are under increasing pressure to address software security concerns. The high-profile data breaches that continuously arise are raising awareness of security issues. Because of this, customers, stakeholders, and boards of directors are asking questions of development teams that they never have before. Questions like:
Posted in Fuzz Testing, Interactive Application Security Testing (IAST), Security Training, Static Analysis (SAST), Web Application Security | Comments Off on Get the latest resource helping development teams overcome widespread challenges
Last week’s news introduced us to another pair of vulnerabilities hitting right at the foundation of everything we place our trust in. Named KRACK and ROCA, these flaws target specific facets of Wi-Fi networks and cryptographic keys, meaning that attackers can potentially sneak into networks we consider private, and decipher things we consider secret.
If you’re in enterprise IT, you’re likely familiar with the cycle of waiting for a patch, then planning and coordinating the rollout of the patch across your estate. What’s interesting in this case is that a lot of the space to be covered includes non-PC devices, so you have to figure out how those will get patched too. (Your plan covers that, right?)
Posted in Data Breach, Security Training, Software Architecture and Design | Comments Off on Learning from KRACK and ROCA: Here’s how to equip your firm