We go beyond traditional application testing to empower you to build security into your software at every stage of your development process. We offer application testing and remediation expertise, guidance for structuring a software security initiative, training, and professional services for a proactive approach to application security.
Christopher Rommel, Executive Vice President, VDC Research and Joe Jarzombek,Security Strategist, Synopsys
Today’s electronic systems are more intelligent, more connected, and more at risk than ever before. A single vulnerability can lead to widespread system-of-systems compromises. Organizations participating in security-critical industries like Aerospace and Defense (A&D) are especially at risk.
In this webinar, Christopher Rommel from VDC and Joe Jarzombek from Synopsys will discuss the results from a recent report highlighting issues facing these organizations. They will also identify what considerations need to be made for the security of software that enables and controls system functionality.
This webinar will explore:
• The importance of quality and security in current projects
• The amount of code re-use from previous projects
• How automated quality and security testing tools can integrate into your current SDLC
So much of the software today is created using third-party code, and why not? After all, it’s quicker and cheaper than building from scratch. Using third-party software, however, isn’t without challenges as the recent report The State of Software Composition Analysis 2017 reveals. In this webinar, the presenters will not only share highlights from this report, but they’ll also explore:
•The use of trusted repositories for open source software, preferably from the source.
•The use of SCA to monitor the ongoing state of software decay.
•The need to update third-party software libraries as appropriate throughout the lifecycle.
A recent survey commissioned by Synopsys was designed to understand the risks to clinicians and patients due to insecure medical devices. The resulting report identified some expected findings, but others were extremely surprising. For instance, 67% of medical device manufacturers and 56% of healthcare delivery organizations believe an attack on a medical device built or in use by their organization is likely to occur over the next 12 months. Join Larry Ponemon of the Ponemon Institute and Mike Ahmadi of Synopsys as they discuss report highlights. They will also provide insight and predictions regarding the future of security in the medical device and healthcare industries.
After taking the world by storm, it’s time to dig into the WannaCry ransomware worm to learn how a decades-old technique is still catching us off-guard. We’ll also examine how to safeguard your organization in the future against this type of attack.
In this webinar, our experts will discuss the benefits of securing your organization's software to keep the bad actors from pivoting from vulnerabilities in the network layer to those in the application layer. We'll show you how to shrink the time to value in the market without compromising quality and security via a secure SDLC.
If you play a role in your organization’s software security program, you know there is no shortage of things to do. In fact, the Building Security In Maturity Model (BSIMM) calls out the 113 most commonly observed software security activities. The BSIMM enables experts like you to discover what others are doing in this universe, how those activities currently work, how they worked in the past, and how they are likely to work in the future.
However, implementing BSIMM activities like a checklist won’t get you to success. It takes some real strategy to efficiently include new software security activities and also ensure existing activities continue to be applied well.
Listen as Sammy Migues, Principal Scientist at Synopsys, discusses how to marry BSIMM activities to a strategy enabling you to build a viable security program. Sammy bases his insights on over 300 in-depth assessments within the BSIMM and 30+ years of industry experience.
The financial services industry (FSI) maintains high-value assets and typically operates in a very complex environment. Applications of all types—web applications, mobile applications, internal web services and so forth—are being developed quickly in response to market pressures by developers with limited security training and with relatively immature processes to support secure application development. This combination presents a juicy target for attackers, and data shows that the FSI continues to be a top target. Attempts to introduce security into the application life cycle frequently face challenges such as a lack of available application security expertise, concerns about costs for tooling, and a fear among product owners that security processes might impede the development cycle and slow their response to market conditions.
This webinar will explore:
- Who is the financial services industry (FSI)?
- Drivers of application security
- Inhibitors of application security
- The foundation of a secure SDLC
Implementing Seeker, Interactive Application Security Testing by Synopsys, in your Agile development environment not only reduces time and cost to remediate security vulnerabilities, but also reduces risk of a data breach. To quantify these benefits, Synopsys commissioned Forrester Consulting to conduct an in-depth customer case study to examine the potential ROI an organization may realize from deploying Seeker.
Join guest speaker Liz Witherspoon, Principal Consultant at Forrester Research, and Nadav Kotlarsky, Sr. Product Manager, as they explore an in-depth customer case study quantifying the potential ROI of deploying Seeker.
Synopsys, Inc. recently released Coverity 8.7, the latest version of the company's industry-leading static analysis tool and one of the core components of its Software Integrity Platform.
This webinar presents several imporant updates to enhance its security analysis and extend its utility to a broader audience, including organizations developing web and mobile applications and software systems for vehicles and other safety-critical systems.
- Enhances Android security analysis to detect critical vulnerabilities and weaknesses on the OWASP Top 10
- Expands desktop analysis with Integrated Development Environment (IDE) plugins for mobile and web application security testing
Software development is a mad rush to market where it seems like the only thing that matters is functionality. Everyone is just trying to make something that works and start selling it before anyone else.
In the long game, security, robustness, and safety are crucial. Resilient, enduring software demands a proper secure development life cycle (SDLC) in order to locate and eliminate vulnerabilities during product development and after release.
Automated tools are indispensable for locating vulnerabilities, and a signoff approach to the SDLC results in a final product, brought to market in a timely fashion, that presents a minimized risk to both producer and consumer.
This presentation examines the classes of tools that locate vulnerabilities and shows how they are used in the context of product development to save time and money and minimize risk.
Congratulations! You’ve taken the first steps to get that great IoT idea of yours into production. You’ve even hired a team of engineers to build out your dream. But in the rush to market, security (and software security in particular) cannot be an afterthought with IoT. Unlike a server crash in an enterprise environment, failure of an IoT device or component can result in direct physical harm. Think of medical devices. Or connected cars. Or industrial control systems. So, are you doing all you can to make sure your software does not contain weaknesses and vulnerabilities that could bite you later on down the road? In this talk I'll discuss the need for software testing, early and often, both known and unknown vulnerabilities. Not only for the code you create in house, but also for the code you adopt from outside sources -- up to 90% can come from sources outside of your control. Topics covered include static analysis, fuzz testing, software composition analysis, interactive application security testing, and test optimization.
Commissioned study conducted by Forrester Consulting on behalf of Synopsys. Join Yan Huang, Sr. Product Marketing Manager - Coverity, and Sami Pataejaesoja, Sr. Product Marketing Manager - Defensics, as they dive deeper into the "The Total Economic Impact of Synopsys Testing Tools: Coverity and Defensics," case study. In this webinar, learn how to use the Total Economic Impact (TEI) framework to assess the potential return on investment your organization can realize by deploying Coverity and Defensics. Watch this webinar to learn how to achieve: faster time to market, fewer post release business disruptions, and best practices from existing customers with years of experience using security testing tools.