Hi [[ session.user.profile.firstName ]]

Synopsys - Software Integrity Group Webcasts

  • Date
  • Rating
  • Views
  • Fuzz Testing From Synopsys
    Fuzz Testing From Synopsys Synopsys Recorded: Nov 2 2017 2 mins
    What if you could test software for unknowns? You can with fuzz testing. Fuzz testing manipulates input data to send until the malformed input causes the software to crash. Our fuzzing solution provides pre-built test suites that eases the burden of manual black box test creation. And our fuzz testing solution runs on any VM or Windows or Linux computer to produce a detailed remediation package that helps identify and fix software issues fast.
  • Software Composition Analysis from Synopsys
    Software Composition Analysis from Synopsys Synopsys Recorded: Nov 2 2017 2 mins
    Wouldn’t it be great to minimize the risks of 3rd party code? Introducing software composition analysis – or SCA -- from Synopsys. Our SCA solution quickly and accurately scans virtually any software package. It produces a bill of materials listing third-party components, their versions, and their location. And our SCA solution runs on either source code or binary, either as a managed service, or as an on premise virtual appliance, so that you always know for certain what’s in your software.
  • Synopsys is Software Security
    Synopsys is Software Security Synopsys Recorded: Nov 2 2017 2 mins
    As the world's 16th largest software company, Synopsys has a history of being a global leader and was recognized by Gartner as a leader in software quality and security solutions. At Synopsys, we offer the most comprehensive solution for integrating security and quality into your SDLC and supply chain and work with over 1,500 industry-leading companies across all sectors including: 17 of the top 20 commercial banks 9 of the top 10 software companies 4 of top 5 managed healthcare firms 3 of top 4 US wireless providers By injecting software quality and security at the right time, at the right depth within your development environment, our software integrity platform promotes productivity and efficiency that empowers customers to develop secure, high-quality software. Our testing solutions improve the accuracy of findings, speeds up the delivery of results, and reduces the level of noise faced by developers.
  • Software Architecture & Design from Synopsys
    Software Architecture & Design from Synopsys Synopsys Recorded: Nov 2 2017 2 mins
    How well do your security controls align with industry best practices? Software design flaws account for up to 50 percent of security vulnerabilities. If you are only checking for bugs in your code or running fuzz tests against your system you might still miss up to half of the security vulnerabilities in your software. Auditing controls, authorizations, and component updates are essential strategies to help reduce security flaws and lower your risk of a breach. But how do you know whether they are implemented correctly? Introducing Software Architecture and Design from Synopsys. Our experts evaluate the design of your key security controls against industry best practices to determine if any are misconfigured, weak, misused, or missing.
  • Red Teaming from Synopsys
    Red Teaming from Synopsys Synopsys Recorded: Nov 2 2017 2 mins
    Do you know how well your organization's people, processes, and technologies can withstand a real-life cyberattack? What level of access and information that an attacker might gain? Personal Identifying Information, Personal Account Number, or corporate intellectual property. What damage might a severe data breach cause? What harm such an attack might bring to the organization’s brand and reputation? Introducing Red Teaming from Synopsys. Red Teaming simulates an attack on the client’s organization to measure how well their people, process, and technologies can withstand a real-life attack situation.
  • Building Security In Maturity Model or BSIMM from Synopsys
    Building Security In Maturity Model or BSIMM from Synopsys Synopsys Recorded: Nov 2 2017 2 mins
    Your company spends a certain amount of money and time on its software security initiative but serious security initiative questions remain. Are we spending enough in Processes? Technology? People? Do the security efforts we have in place today even make sense? And, more critically, what are the other guys doing? Wouldn't it be great if you could compare your security model to others? You can. Introducing Building Security In Maturity Model or BSIMM from Synopsys. It's an analytical process that compares observations of your own software security initiative with that of others.
  • Managed Services from Synopsys
    Managed Services from Synopsys Synopsys Recorded: Nov 2 2017 2 mins
    Really good security experts are difficult to find and expensive to hire. On top of that, you may not have a consistent need for their skill set. Wouldn't it be great to pay only for what you need, only when you need it? Introducing Managed Services from Synopsys, a security-as-a-service (SaaS) for all your software security needs.
  • Silver Bullet Podcast #139 with Matias Madou
    Silver Bullet Podcast #139 with Matias Madou Gary McGraw Recorded: Oct 31 2017 26 mins
    Matias Madou is a co-founder and the CTO of Secure Code Warrior, where he provides the company’s technology vision and oversees the engineering team. He has over 15 years of hands-on software security experience. Matias was a researcher at HP Fortify and a founder of Sensei Security. He also holds 10 patents and has been very active in technology transfer from the lab to commercial products. He’s a sought-after speaker as well, and we’re proud of his presence at the 2017 BSIMM Community Conference. Matias holds a Ph.D. in computer engineering from Ghent University and currently lives in Belgium with his family.

    Listen as Gary and Matias talk about effective software security testing methods, security research, secure development training, and more.
  • Getting Application Security Up to Speed with DevOps
    Getting Application Security Up to Speed with DevOps Scott Crawford, Research Director of Information Security with 451 Research, Meera Subbarao with Synopsys, Recorded: Oct 10 2017 58 mins
    The DevOps revolution continues to advance – and security must advance with it. Too often, however, approaches to application security remain stuck in the past. Throwing security assessment results over the fence to developers never really worked, and it certainly won’t survive the transition to DevOps and CI/CD, where agile techniques and automation set a demanding pace.

    In this webinar, Scott Crawford, Research Director of Information Security with 451 Research, and Meera Subbarao with Synopsys, will highlight:

    •The many points of opportunity DevOps present to engage in real collaboration across security, development and operations teams (it’s not just about testing!)
    •How DevOps introduces opportunities to “shift left” with the security investment, and reduce the cost impact of security remediation and response
    •Where and how security efforts can capitalize on automation and integration with DevOps toolsets
    •Sourcing expertise: Security and development both require specialized expertise. Security in DevOps requires a unique mix of both. How can you find it?
  • Silver Bullet Podcast #138 with Nicole Perlroth
    Silver Bullet Podcast #138 with Nicole Perlroth Gary McGraw Recorded: Sep 29 2017 32 mins
    Nicole Perlroth covers cyber security for the New York Times. Before joining the San Francisco bureau in 2011, she was deputy editor at Forbes where she covered venture capital and web start-ups. Nicole is the recipient of several journalism awards for her reporting on efforts by the chinese government to steal military and industrial trade secrets. She is currently working on a cyber security book, This Is How They Tell Me the World Ends for Penguin/Portfolio (2017). She holds a B.A. in Politics and Near Eastern Studies from Princeton and a M.A. in Journalism from Stanford. She’s a native of the Bay Area where she still lives.

    Listen as Gary and Nicole talk about life as a cyber security journalist, being a woman in the security industry, and playing up the sex appeal of cyber security.

Embed in website or blog