Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Cybersecurity Executive Order requires new software security standards

President Biden’s Cybersecurity Executive Order requires new software security standards and best practices. Learn what you can do to prepare now. By: Tim Mackey, Principal Security Strategist, Synopsys Cybersecurity Research Center (CyRC) and Adam Isles, Principal, The Chertoff Group On Wednesday, May 12, President Biden signed an extensive Executive Order (E.O.) on Improving the Nation’s Cybersecurity. The E.O.

Open source license compliance and dependencies: Peeling back the licensing layers

How can you successfully navigate open source license compliance? Start with the right tools to identify your dependences and calculate their risks. What if you have an open source software package licensed under a permissive license like the Apache or MIT, but inside that package are dependencies licensed under a restrictive license like the General Public License (GPL)? What are some best practices to follow?

Top 10 DevSecOps best practices for building secure software

Ready to transition your organization to DevSecOps but unsure of where to begin? Get started with our top 10 DevSecOps best practices. By: Sneha Kokil, associate principal consultant, and Arvind Balaji, associate principal consultant, at Synopsys. While the software industry celebrates a decade of DevOps, there’s an increasing drive toward adopting DevSecOps and making security a part of software from early on.

DevSecOps at scale and speed with Intelligent Orchestration

AppSec shouldn’t compromise velocity. Learn how Intelligent Orchestration optimizes AppSec testing while removing complexity from DevOps toolchains. To stay competitive, organizations are embracing digital transformation and innovating at record speed. In order to achieve this, they’re embracing agility through processes such as DevOps, site reliability engineering, GitOps, and more.

Biden on cyber security after 100 days: A good start, but now comes the hard part

Cyber security experts weigh in on what we’ve learned about President Biden’s cyber security strategy in his first 100 days in office. President Joe Biden declared in mid-December, more than a month before he took office, that cyber security would be a “top priority” of his administration. It should be. The digital world, as we are all now reminded daily, has a direct impact on the real world, for better and worse.

Improve your AppSec program with the Synopsys partner ecosystem

Understand how the Synopsys partner ecosystem can help your organization address your software quality and application security challenges. To build secure, high-quality software in today’s challenging environment, organizations need world-class partnerships backed by industry-leading software quality and application security products and services.

Why automation is critical for your software development

Automation, when done properly, can improve the productivity, quality, safety and security in your software development. Automation isn’t just a “nice-to-have” element of modern business. It’s a “must-have.” Companies simply can’t compete on multiple levels—quality, speed to market, safety, and security—if they rely on manual tools and processes.

How to cyber security: 5G is not magic

5G is faster than its predecessor but that doesn’t change the approach to software security for your applications. Some wild claims have been made about 5G networking. I’ve heard mention of self-healing factories and smart highway systems. While such things might be possible, there’s nothing magical about 5G. In essence, it’s just faster wireless networking than we’ve had before. That’s nice, but hardly revolutionary.

Assessing the state of mobile application security through the lens of COVID-19

Are today’s mobile apps secure or do they offer opportunities for attackers? Learn about the state of mobile application security in our new report. Synopsys recently released a report, “Peril in a Pandemic: The State of Mobile Application Security,” produced by its Cybersecurity Research Center (CyRC), examining the state of mobile application security during the COVID-19 pandemic.

The 411 on Stack Overflow and open source license compliance

Many of the third-party components we find in audits have been pulled in their entirety from public software repositories (with GitHub being the most popular these days). But with some frequency we also come across snippets—lines of code that have been copied and pasted into source code. They might be a piece of a GitHub project, but they may also have been taken from a blog site like Stack Overflow or CodeGuru.