How do you effectively remediate the increasing sea of vulnerabilities?

With applications containing more and more open source, and 40+ open source vulnerabilities disclosed daily, how do you prioritize your remediation efforts?
The post How do you effectively remediate the increasing sea of vulnerabilities? appeared firs… Continue reading How do you effectively remediate the increasing sea of vulnerabilities?

How to Cyber Security: Software is manufacturing

Modern software is a bit like manufacturing: gluing open source components together using proprietary code and tracking everything with a bill of materials.
The post How to Cyber Security: Software is manufacturing appeared first on Software Integrity… Continue reading How to Cyber Security: Software is manufacturing

[Webinar] Effective Vulnerability Remediation Requires More Than One Data Point

With advanced policy management and best-in-class vulnerability reports, developers can fix the most critical vulnerabilities quickly and effectively.
The post [Webinar] Effective Vulnerability Remediation Requires More Than One Data Point appeared fi… Continue reading [Webinar] Effective Vulnerability Remediation Requires More Than One Data Point

Find and fix open source and proprietary code security defects in the IDE with Polaris and Code Sight

With new SCA capabilities, the Code Sight IDE plugin detects vulnerabilities (CVEs) in the open source you use, alongside weaknesses in proprietary code.
The post Find and fix open source and proprietary code security defects in the IDE with Polaris a… Continue reading Find and fix open source and proprietary code security defects in the IDE with Polaris and Code Sight

[Webinars] Black Duck on VMware Cloud and open source scans

Learn about the addition of Black Duck to VMware Cloud Marketplace and the benefits and limitations of different types of open source scans.
The post [Webinars] Black Duck on VMware Cloud and open source scans appeared first on Software Integrity Blog… Continue reading [Webinars] Black Duck on VMware Cloud and open source scans

Taking the next step in your application security program

Already using static code analysis? Try boosting your application security program with software composition analysis to automate open source management.
The post Taking the next step in your application security program appeared first on Software Int… Continue reading Taking the next step in your application security program

Coverity & Black Duck together. Better. Faster. Stronger.

Using static code analysis (SAST) and software composition analysis (SCA) together makes your software development process better, faster, and stronger.
The post Coverity & Black Duck together. Better. Faster. Stronger. appeared first on Software … Continue reading Coverity & Black Duck together. Better. Faster. Stronger.

Synopsys adds GitHub Action for SAST and SCA

GitHub Actions brings the platform into the CI/CD market, making it simple to integrate SAST and SCA into workflows with the Synopsys Detect GitHub Action.
The post Synopsys adds GitHub Action for SAST and SCA appeared first on Software Integrity Blog… Continue reading Synopsys adds GitHub Action for SAST and SCA

World’s top hackers meet at the first 5G Cyber Security Hackathon

Our Defensics R&D team put a couple of Synopsys tools to the test in the 5G Cyber Security Hackathon in Oulu, Finland, and placed in both of their competitions.
The post World’s top hackers meet at the first 5G Cyber Security Hackathon appea… Continue reading World’s top hackers meet at the first 5G Cyber Security Hackathon