Software Integrity Blog

Archive for the 'Security Training' Category

 

The cybersecurity workforce executive order: Real potential or wishful thinking?

The cybersecurity executive order of 2019 is meant to boost cyber security skills and improve national defense against growing cyber threats. Will it work?

Continue Reading...

Posted in Security Training | Comments Off on The cybersecurity workforce executive order: Real potential or wishful thinking?

 

Coding bootcamps need to get real about secure coding practices

Coding bootcamps fill development seats fast—but the trade-off for speed is security. How do you fill the security training gaps in your developers’ education?

Continue Reading...

Posted in Security Training | Comments Off on Coding bootcamps need to get real about secure coding practices

 

How to get cloud security training for your team

To give your team the latest cloud security training, you need a fixed core curriculum and the flexibility to customize cloud training to each person’s needs.

Continue Reading...

Posted in Cloud Security, Developer Enablement, Security Training, Webinars | Comments Off on How to get cloud security training for your team

 

Webinar: Using Security Champions to build a DevSecOps culture within your organization

In our on-demand webinar with Brendan Sheairs (Synopsys), you’ll learn about the fundamentals and challenges of building a Security Champions program to transform DevOps into DevSecOps.

Continue Reading...

Posted in Agile, CI/CD & DevOps, General, Security Training, Webinars | Comments Off on Webinar: Using Security Champions to build a DevSecOps culture within your organization

 

Coverity now features integrated on-demand developer training

The latest release of Coverity by Synopsys features seamless integration with our completely rebuilt eLearning platform, an on-demand developer training solution focusing on secure coding best practices and security guidance. On-demand developer training enables development teams Synopsys eLearning is an outcome-driven, learner-centric training solution that makes learning about security easy, relevant, and accessible. With eLearning, learners have on-demand access to an immersive, continuous learning ecosystem that unifies security expertise, instructional design, and storytelling into an intuitive platform. Features include:

Continue Reading...

Posted in Security Training, Static Analysis (SAST) | Comments Off on Coverity now features integrated on-demand developer training

 

How effective is storytelling in eLearning courses?

Synopsys eLearning goes beyond your typical training solution. Our course offerings provide developers with targeted training that centers specifically on the security frameworks and platforms they’re using.

Continue Reading...

Posted in Security Training | Comments Off on How effective is storytelling in eLearning courses?

 

Synopsys eLearning empowers developers to achieve security compliance with security competency

Written in coordination with Prasaath Velu

Continue Reading...

Posted in Security Training | Comments Off on Synopsys eLearning empowers developers to achieve security compliance with security competency

 

A lack of software security training puts companies at risk

An old proverb states that if you give a man a fish, you feed him for a day; but, if you teach a man to fish, you feed him for life. Software security training aligns very well with this proverb.

Continue Reading...

Posted in General, Security Training | Comments Off on A lack of software security training puts companies at risk

 

Get the latest resource helping development teams overcome widespread challenges

Only when security is treated with the same importance as quality can your software’s integrity drive a proactive strategy rather than a reactive response. In addition to ensuring software quality, development teams are under increasing pressure to address software security concerns. The high-profile data breaches that continuously arise are raising awareness of security issues. Because of this, customers, stakeholders, and boards of directors are asking questions of development teams that they never have before. Questions like:

Continue Reading...

Posted in Fuzz Testing, Interactive Application Security Testing (IAST), Security Training, Static Analysis (SAST), Web Application Security | Comments Off on Get the latest resource helping development teams overcome widespread challenges

 

Learning from KRACK and ROCA: Here’s how to equip your firm

Last week’s news introduced us to another pair of vulnerabilities hitting right at the foundation of everything we place our trust in. Named KRACK and ROCA, these flaws target specific facets of Wi-Fi networks and cryptographic keys, meaning that attackers can potentially sneak into networks we consider private, and decipher things we consider secret. Who’s affected? If you’re in enterprise IT, you’re likely familiar with the cycle of waiting for a patch, then planning and coordinating the rollout of the patch across your estate. What’s interesting in this case is that a lot of the space to be covered includes non-PC devices, so you have to figure out how those will get patched too. (Your plan covers that, right?)

Continue Reading...

Posted in Data Breach, Security Training, Software Architecture and Design | Comments Off on Learning from KRACK and ROCA: Here’s how to equip your firm