Software Integrity

Archive for February 2016

 

Defensics Agent Framework

During past few months, Synopsys R&D has been busy with improving the Defensics instrumentation capabilities. Focus has been given to providing more powerful tools for controlling and monitoring the status of the system under test (SUT). Fuzzing is an effective testing technique but it is sometimes hard to detect an exact testcase or sequence which […]

Continue Reading...

Posted in Seeker | Comments Off on Defensics Agent Framework

 

Costly Mistakes to Avoid When Choosing a Managed Services Partner

Applications support some of the most strategic business processes and access an organization’s most sensitive data. However, application security continues to receive less budget and attention than network security. Thanks to the high-profile data breaches of the past few years, we can’t blame lack of awareness for the lack of investment. Security experts and business […]

Continue Reading...

Posted in Application Security, Software Security Testing | Comments Off on Costly Mistakes to Avoid When Choosing a Managed Services Partner

 

US Cybersecurity National Action Plan Includes UL’s Software Testing Program

On Tuesday the White House announced its Cybersecurity National Action Plan (CNAP). It builds on the momentum to secure the government’s and the nation’s databases and use of the Internet following the passage of the Cybersecurity Act of 2015 in December and heavily leverages newly created mechanisms for private companies to share cyber threat information […]

Continue Reading...

Posted in Internet of Things | Comments Off on US Cybersecurity National Action Plan Includes UL’s Software Testing Program

 

Do You Believe the 7 Myths of Software Security Best Practices?

There’s no silver bullet for securing software. The reality is that security involves a multi-dimensional approach over an organization’s entire application portfolio. To bring truth to some of the most widespread security misconceptions, we’ve developed the seven myths of software security best practices. These myths explore how software security initiatives should work, and aren’t simply about how to […]

Continue Reading...

Posted in Maturity Model (BSIMM), Security Risk Assessment, Software Development Life Cycle (SDLC), Software Security Program Development | Comments Off on Do You Believe the 7 Myths of Software Security Best Practices?