Software Integrity Blog

The journey to better medical device security: Still slow, still bumpy

Medical device security is not keeping up with new threats. Among the reasons: funding, delayed initiatives, and a focus on critical service delivery.

Continue Reading...

[Webinar] Mobile application hardening for business-critical apps

Mobile apps often protect themselves via internally developed controls and commercial products. Learn about how some controls work and how to sidestep them.

Continue Reading...

Our top software security stories from 2019

From software security to open source, code quality, regulatory compliance, and the future of software development, here are our top stories from 2019.

Continue Reading...

Consumers, the security of connected toys is pretty much up to you

Connected toys, a hot holiday seller, aren’t all fun and games. What questions should buyers be asking about the security and privacy of connected toys?

Continue Reading...

Mackey: Security isn’t ‘front of mind’ in the IoT

IoT security isn’t keeping pace with the growth in IoT devices. Apparently, this is still news to many users and creators. What can we do to secure the IoT?

Continue Reading...

Report: Cyber threats growing, but security responses aren’t keeping pace

A worrying number of companies said they don’t plan to improve their cyber security programs, despite the threats. But all it takes to start is a roadmap.

Continue Reading...

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019.

Continue Reading...

How to Cyber Security: Software is critical infrastructure

Information technology is the fundamental sector on which all others depend. Software is critical infrastructure and deserves the same security investment.

Continue Reading...

World’s top hackers meet at the first 5G Cyber Security Hackathon

Our Defensics R&D team put a couple of Synopsys tools to the test in the 5G Cyber Security Hackathon in Oulu, Finland, and placed in both of their competitions.

Continue Reading...

Open source for lawyers: Challenges of open source use

Open source is widespread because it’s easy to use. But it comes with unique security challenges, and poor open source management can be a costly liability.

Continue Reading...