Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Synopsys

Software Vulnerability Snapshot Report Findings

Using anonymized data from three years of tests conducted on commercial software systems and applications, the recently published 2023 Software Vulnerability Snapshot report from Synopsys focuses on exposing persistent vulnerabilities that are significant challenges to web and software application security, including the top three vulnerability types related to.

Critical aspects of a secure software supply chain

What do the Log4J zero-day vulnerability, the SolarWinds attack, and Alex Birsan’s hacking of Apple and Microsoft have in common? The answer is simple: software supply chain security. But while the answer may be simple, each example highlights a different aspect of software supply chain security.

Secure cloud-native apps and APIs at the speed your business demands

The cloud-native development model entered the mainstream in recent years, with technologies such as microservices and serverless computing, containers, APIs, and infrastructure-as-code (IaC) at the forefront of this trend. Thanks to these emerging technologies, organizations can build and run their apps fast, in a distributed manner, and without reliance on physical hardware infrastructures.

The benefits of business logic assessments

The digital realm is an ever-expanding universe, and web applications serve as the gateway to valuable customer data, sensitive information, and financial transactions. Threat actors and cybercriminals are constantly devising new techniques to exploit vulnerabilities within these applications. Further, data privacy is a paramount concern, and organizations are entrusted with safeguarding information.

The hidden business risks of technical debt in mergers and acquisitions

In the fast-paced world of technology business, mergers and acquisitions (M&As) have become commonplace. Companies often seek growth, innovation, and market expansion through these strategic moves. However, amidst the excitement of potential synergies and increased market share, there is a lurking danger that can significantly impact the success of an M&A deal: technical debt.

How to respond to the curl and libcurl vulnerabilities

As referenced in our previous post, the software development world has been bracing for additional details regarding two vulnerabilities associated with cURL, one of which was assessed as critical by the maintainer and original creator of the project. The wait ended this morning, as a fixed version was released and details about the vulnerabilities were provided.

Deep Dive: 2023 Global State of DevSecOps Report

Aimed at examining the strategies, tools, and practices impacting software security, the just-released “Global State of DevSecOps 2023” report from Synopsys, is based on a survey conducted by Censuswide polling more than 1,000 IT professionals across the world. The following is a deep dive into key report findings.