How to achieve MISRA and AUTOSAR coding compliance

Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security in automotive software.
The post How to achieve MISRA and AUTOSAR coding compliance appeared first on Software Integrity Blog.
The post How to achieve … Continue reading How to achieve MISRA and AUTOSAR coding compliance

Cyber security assurance levels in the automotive supply chain

With the ISO SAE 21434 standard for road vehicles coming soon, learn the role cyber security assurance levels play in your road vehicle safety program.
The post Cyber security assurance levels in the automotive supply chain appeared first on Software … Continue reading Cyber security assurance levels in the automotive supply chain

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019.
The post Cost of data breaches in 2019: The 4 worst hits on the corporate wallet appeare… Continue reading Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

How the 2019 CWE Top 25 can boost your application security

You can use the 2019 CWE Top 25 to help focus your application security efforts. Learn more about this list of the 25 most dangerous software weaknesses.
The post How the 2019 CWE Top 25 can boost your application security appeared first on Software I… Continue reading How the 2019 CWE Top 25 can boost your application security

Coverity release ties in well to the latest MITRE CWE Top 25

MITRE’s 2019 CWE Top 25 list contains many code quality issues that can result in security vulnerabilities. Static analysis can help you mitigate them.
The post Coverity release ties in well to the latest MITRE CWE Top 25 appeared first on Softw… Continue reading Coverity release ties in well to the latest MITRE CWE Top 25

The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come?
The post The False Claims Act: 156 years old and newly relevant to software security appeared fir… Continue reading The False Claims Act: 156 years old and newly relevant to software security

Is Ireland too soft with GDPR enforcement, or just being prudent?

Some are concerned by the lack of GDPR fines issued by Ireland, the lead regulator for many tech giants. But the country’s taking its time for good reason.
The post Is Ireland too soft with GDPR enforcement, or just being prudent? appeared first… Continue reading Is Ireland too soft with GDPR enforcement, or just being prudent?

[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

In our software compliance webinar, Matan Scharf (Synopsys) explains the hidden security dangers of software standardization. Watch May 30 @ 10 a.m. Eastern.
The post [Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin appeared first… Continue reading [Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

[Webinars] Tech due diligence, IAST, and government software

Learn about web services and APIs in tech due diligence, the magic of IAST, and software risks for DoD and government agencies in our upcoming webinars.
The post [Webinars] Tech due diligence, IAST, and government software appeared first on Software I… Continue reading [Webinars] Tech due diligence, IAST, and government software