Leveraging Seeker to Verify Vulnerabilities Reported by Black Duck

Presented by

Ira Cherkes-Levinshteyn, Synopsys

About this talk

Seeker’s interactive web application testing (IAST) integrates with Black Duck Binary Analysis to provide verification for third-party and open source components’ known vulnerabilities. Seeker provides not only the verification, but also the user code that ultimately invokes the vulnerable third-party code, thus providing developers with a risk-prioritized list of verified vulnerabilities to fix. You will: * Get a short introduction to Seeker and its main capabilities * Learn how to set up the integration between Seeker and Black Duck Binary Analysis. * Learn how to leverage Seeker to verify vulnerabilities reported by Black Duck.

Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (130)
Subscribers (30951)
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations optimize security and quality in DevSecOps and throughout the software development life cycle.