Software Integrity Blog


[Webinars] Fuzz testing, DevOps with Red Hat, and ISO/SAE 21434

Learn about the ins and outs of fuzzing, how to secure your DevOps pipeline with Synopsys and Red Hat, and what ISO/SAE 21434 means for automotive security.

Register for our fuzzing webinar

The Ins and Outs of Fuzzing

“Another day, another data breach” is not just a cliché; it’s a reality. But all data breaches are not equal. To avoid becoming the next victim, you must create software that’s more secure, higher quality, and compliant with standards.

This webinar will introduce you to the concept of fuzzing, as well as Synopsys’ best-of-breed fuzzing solution, Defensics. Fuzzing is well established as an excellent technique for locating vulnerabilities in software. Register for this webinar to learn:

  • What fuzzing is, how it works, and when and why you should use it
  • How various fuzzing approaches differ and the pros and cons of each
  • How Defensics uses generational / specification-based fuzzing to test over 250 protocols effectively and efficiently

What: The Ins and Outs of Fuzzing

When: Available on demand

Who: Kimm Yeo, Product Marketing Manager, Synopsys; Rikke Kuipers, Product Manager, Synopsys

Watch now

Register for the Synopsys and Red Hat DevOps webinar

Secure Your ‘Dev’ and ‘Ops’ Pipeline With Synopsys and Red Hat

Synopsys and Red Hat team up once again to bring you the best-in-class solution to secure your “Dev” and “Ops” pipeline without compromising speed. Red Hat’s secure-by-design OpenShift platform provides operations teams with an out-of-the-box secure Kubernetes deployment, and Synopsys application security tools ensure development teams build secure applications and images with high quality. Combining the capabilities of Red Hat and Synopsys is key in making sure that deployed applications are less susceptible to attacks.

Join the experts from Red Hat and Synopsys as they present these topics:

  • Augmenting Red Hat’s secure-by-design OpenShift platform
  • Consolidating containerized application security perspectives
  • Integrating Synopsys’ application security testing (AST) solutions into Tekton-based OpenShift Pipelines
  • Application and host container security with CoreOS, Quay, and Black Duck
  • Reducing false positives by combining security feeds with OVAL, RHSA, and BDSA

What: Secure Your ‘Dev’ and ‘Ops’ Pipeline With Synopsys and Red Hat

When: Available on demand

Who: Gautam Baghel, Global Technical Alliances, Synopsys; Dave Meurer, Partner Solutions Architect, Red Hat

Watch now

Register for our ISO SAE 21434 webinar

Secure Automotive Software Development in the Age of ISO/SAE 21434

Modern vehicles run on software containing more than 150 million lines of code. As a result of more advanced safety-relevant functionality, such as ADAS and autonomous driving, as well as new communication interfaces, mobile apps, and back-end servers based on connected car use cases, the need for developing secure systems in the automotive industry is higher than ever. A draft of the new cyber security standard ISO/SAE 21434 was recently released to help automotive companies address cyber security for the entire vehicle life cycle.

This talk presents cyber security activities in the software development process based on ISO/SAE 21434 to help automotive companies develop more secure systems. We’ll provide examples of what is required from a resources and tools perspective to ensure an efficient and practical implementation of the various cyber security steps in the development process.

What: Secure Automotive Software Development in the Age of ISO/SAE 21434

When: Available on demand

Who: Dr. Dennis Kengo Oka, Principal Automotive Security Strategist, Synopsys

Watch now


More by this author