We go beyond traditional application testing to empower you to build security into your software at every stage of your development process. We offer application testing and remediation expertise, guidance for structuring a software security initiative, training, and professional services for a proactive approach to application security.
Steve Cohen, Product Marketing Manager, Synopsys & Robert Vamosi, CISSP and Security Strategist, Synopsys
After taking the world by storm, it’s time to dig into the WannaCry ransomware worm to learn how a decades-old technique is still catching us off-guard. We’ll also examine how to safeguard your organization in the future against this type of attack.
In this webinar, our experts will discuss the benefits of securing your organization's software to keep the bad actors from pivoting from vulnerabilities in the network layer to those in the application layer. We'll show you how to shrink the time to value in the market without compromising quality and security via a secure SDLC.
If you play a role in your organization’s software security program, you know there is no shortage of things to do. In fact, the Building Security In Maturity Model (BSIMM) calls out the 113 most commonly observed software security activities. The BSIMM enables experts like you to discover what others are doing in this universe, how those activities currently work, how they worked in the past, and how they are likely to work in the future.
However, implementing BSIMM activities like a checklist won’t get you to success. It takes some real strategy to efficiently include new software security activities and also ensure existing activities continue to be applied well.
Listen as Sammy Migues, Principal Scientist at Synopsys, discusses how to marry BSIMM activities to a strategy enabling you to build a viable security program. Sammy bases his insights on over 300 in-depth assessments within the BSIMM and 30+ years of industry experience.
The financial services industry (FSI) maintains high-value assets and typically operates in a very complex environment. Applications of all types—web applications, mobile applications, internal web services and so forth—are being developed quickly in response to market pressures by developers with limited security training and with relatively immature processes to support secure application development. This combination presents a juicy target for attackers, and data shows that the FSI continues to be a top target. Attempts to introduce security into the application life cycle frequently face challenges such as a lack of available application security expertise, concerns about costs for tooling, and a fear among product owners that security processes might impede the development cycle and slow their response to market conditions.
This webinar will explore:
- Who is the financial services industry (FSI)?
- Drivers of application security
- Inhibitors of application security
- The foundation of a secure SDLC
Implementing Seeker, Interactive Application Security Testing by Synopsys, in your Agile development environment not only reduces time and cost to remediate security vulnerabilities, but also reduces risk of a data breach. To quantify these benefits, Synopsys commissioned Forrester Consulting to conduct an in-depth customer case study to examine the potential ROI an organization may realize from deploying Seeker.
Join guest speaker Liz Witherspoon, Principal Consultant at Forrester Research, and Nadav Kotlarsky, Sr. Product Manager, as they explore an in-depth customer case study quantifying the potential ROI of deploying Seeker.
Synopsys, Inc. recently released Coverity 8.7, the latest version of the company's industry-leading static analysis tool and one of the core components of its Software Integrity Platform.
This webinar presents several imporant updates to enhance its security analysis and extend its utility to a broader audience, including organizations developing web and mobile applications and software systems for vehicles and other safety-critical systems.
- Enhances Android security analysis to detect critical vulnerabilities and weaknesses on the OWASP Top 10
- Expands desktop analysis with Integrated Development Environment (IDE) plugins for mobile and web application security testing
Software development is a mad rush to market where it seems like the only thing that matters is functionality. Everyone is just trying to make something that works and start selling it before anyone else.
In the long game, security, robustness, and safety are crucial. Resilient, enduring software demands a proper secure development life cycle (SDLC) in order to locate and eliminate vulnerabilities during product development and after release.
Automated tools are indispensable for locating vulnerabilities, and a signoff approach to the SDLC results in a final product, brought to market in a timely fashion, that presents a minimized risk to both producer and consumer.
This presentation examines the classes of tools that locate vulnerabilities and shows how they are used in the context of product development to save time and money and minimize risk.
Congratulations! You’ve taken the first steps to get that great IoT idea of yours into production. You’ve even hired a team of engineers to build out your dream. But in the rush to market, security (and software security in particular) cannot be an afterthought with IoT. Unlike a server crash in an enterprise environment, failure of an IoT device or component can result in direct physical harm. Think of medical devices. Or connected cars. Or industrial control systems. So, are you doing all you can to make sure your software does not contain weaknesses and vulnerabilities that could bite you later on down the road? In this talk I'll discuss the need for software testing, early and often, both known and unknown vulnerabilities. Not only for the code you create in house, but also for the code you adopt from outside sources -- up to 90% can come from sources outside of your control. Topics covered include static analysis, fuzz testing, software composition analysis, interactive application security testing, and test optimization.
Commissioned study conducted by Forrester Consulting on behalf of Synopsys. Join Yan Huang, Sr. Product Marketing Manager - Coverity, and Sami Pataejaesoja, Sr. Product Marketing Manager - Defensics, as they dive deeper into the "The Total Economic Impact of Synopsys Testing Tools: Coverity and Defensics," case study. In this webinar, learn how to use the Total Economic Impact (TEI) framework to assess the potential return on investment your organization can realize by deploying Coverity and Defensics. Watch this webinar to learn how to achieve: faster time to market, fewer post release business disruptions, and best practices from existing customers with years of experience using security testing tools.
Connectivity is making cybersecurity a must-have obligation from initial designs through end of life. Automakers and suppliers have several unique challenges as they attempt to provide connectivity in vehicles that have burgeoning amounts of software that must remain secure and efficient over long vehicle lifetimes. Throughout the industry, there is a race to leverage safeguards used in other industries in ways that meet automotive safety and reliability requirements.
During this one-hour webinar, industry experts will address design, development, and implementation of security-critical cyber-physical vehicle systems; implementation strategies, process, and lifecycle management; and cybersecurity assurance verification and validation practices being implemented by members of SAE working groups. A number of tools will be employed, many using over the air (OTA) updating to fix vulnerabilities and adapt to changing threats.
An audience Q&A will follow the technical presentations.
As the automotive industry embraces software and connectivity to deliver innovative features and functionality, the code bases of in-vehicle systems have grown exponentially, sustained by increasingly complex software supply chains. The pace and magnitude of this change challenges the incumbent resources and processes that OEMs and their suppliers possess to test and harden these interconnected and often safety-critical systems. This paradigm, compounded by the evolving threat landscape and sophistication of cyber attackers, is elevating the level of risk associated with automotive software quality, security, and compliance. As demonstrated by recent vehicles hacks and the subsequent recalls and unwanted attention from regulators and mainstream media, insecure software poses a very real threat to the automotive industry.
Join Chris Rommel of VDC Research and John Jacott of Synopsys’ Software Integrity Group as they explore the mounting software challenges faced by OEMs and their suppliers. Learn how the automotive industry can adapt by leveraging existing solutions and best practices to drive down risk while maintaining agility and the innovative edge that modern technology affords.
There are plenty of good ideas for improving the testing process, but many teams struggle to put these ideas into practice. How can a QA team make the most of testing practices that span multiple teams and development phases, utilize different technologies, address different objectives and include automated and manual workflows?
Listen in to learn how Synopsys can help your team take practical steps to improve testing by:
-Enabling developers to improve code quality and security, early
-Prioritizing testing runs based on business risk and the impact of product changes
-Addressing important testing gaps while avoiding redundant testing