Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What the EU Cyber Resilience Act Means for AppSec Michael White, Technical Director and Principal Architect & Per-Olof Persson, Principal Solution Advisor Europe, Synopsys With the cost of cyberattacks predicted to cost $10.5 trillion by 2025, the European Commission is looking to transform the cybersecurity landscape th... 1 day ago | 34 mins Coffee with a Slice of SBOM Mike McGuire, Senior Software Solutions Manager, Synopsys For a variety of reasons, everyone is talking about software Bills of Materials (SBOMs). Some organizations are being required to generate and provide... 1 week ago | 42 mins Take Action: Putting Open Source Risk Management Policies to Work Aditi Sharma, Dell; Patricia Tarro, Dell; Mike Phillips, Dell & Anthony Decicco, GTC Law Group Once you have a grasp on how open source can both benefit and introduce risk to your organization, your next consideration should be learning to manag... 6 days ago | 51 mins DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... 6 days ago | 57 mins Open Source: A Key Link in the Software Supply Chain Anthony Decicco, GTC Law Group Open source makes the world go round. It’s easy to use and simple to plug in. Used correctly, it gives you the competitive edge you need to focus more... 3 weeks ago | 41 mins Building Security into DevOps Without Breaking It Steven Zimmerman, Product Marketing - Developer Solutions As development technologies become more fast-paced, modular, and automated, the tools and practices used to secure the software that passes through th... 6 days ago | 16 mins Takeaways from Recent Software Supply Chain Developments Anthony Decicco, GTC Law Group Modern application development and deployment models make for a software supply chain that’s more complicated than ever before. While managing the ope... March 2, 2023 9:00am How Do I Use JWTs Safely? The Do's and Don'ts Ira Cherkes Levinshteyn, Senior Software Engineer JSON web tokens (JWTs) are widely used in authentication processes to transfer information in a JSON format while ensuring data integrity. However, ju... 3 weeks ago | 28 mins Software Construction & Business Risk: Best Practices for Software Due Diligence Declan Burns and Phil Odence, Synopsys The purpose of software due diligence is to identify risks in software. Understanding how software is developed and what kinds of issues can lurk in t... February 8, 2023 5:00pm OWASP Top 10: Identification and Authentication Failures Jonathan Knudsen, Head of Global Research Listed at #7 in the OWASP Top 10, identification and authentication failures include a variety of errors related to login and authentication. Learn ho... February 8, 2023 5:00pm Load more