Software Integrity Blog

Synopsys receives a 2019 SD Times 100 award in security

As a software security company, we value recognition from development organizations above all else. So we’re pleased to receive a 2019 SD Times 100 security award.

Continue Reading...

You’re using open source software, and you need to keep track of it

How should you track open source? It’s almost definitely in your codebase, so the question is not whether to track it but what could happen if you don’t.

Continue Reading...

Top 4 website security tips for development and hosting

If you design, develop, or host websites for SMBs, your clients are trusting you to keep their data secure. Here are our top 4 website security tips.

Continue Reading...

The Verizon DBIR and the art of the breach

An attack path is a series of threat actions leading to a successful data breach. The Verizon 2019 DBIR (Data Breach Investigations Report) offers insights.

Continue Reading...

[Webinars] Software security metrics and open source security

Learn how to drive your software security initiative with metrics, and get practical advice for open source security with Red Hat, in our upcoming webinars.

Continue Reading...

Ransomware succeeds because targets don’t learn from history

How can organizations prevent ransomware attacks? The Atlanta and Baltimore attacks prove that patch management and employee training should take priority.

Continue Reading...

It’s not just autonomous cars of the future that need security

The future of secure autonomous vehicles starts today. But the auto industry has to overcome some challenges, like shifting left and building security in.

Continue Reading...

[Webinar] Risk-Based Adaptive DevSecOps

In our DevSecOps webinar, Meera Rao explains how to close the gap between DevOps and security with a risk-based adaptive pipeline. Available on demand.

Continue Reading...

Synopsys Software Integrity Group receives Red Hat Partner Award

Synopsys and Red Hat have established a world-class partnership to enable open source management and application security testing in container environments.

Continue Reading...

The cybersecurity workforce executive order: Real potential or wishful thinking?

The cybersecurity executive order of 2019 is meant to boost cyber security skills and improve national defense against growing cyber threats. Will it work?

Continue Reading...