Software Integrity

Archive for the 'Seeker' Category

 

Webinar: The Total Economic Impact of the Seeker IAST Tool

In The Total Economic Impact™ Of Seeker®-Interactive Application Security Testing (IAST) by Synopsys, a December 2016 commissioned study conducted by Forrester Consulting on behalf of Synopsys, Forrester Consulting performed an in-depth cost-benefit analysis of an organization deploying the Seeker solution in an Agile development environment. Forrester found the organization interviewed for the study experienced: Reduced risk of a […]

Continue Reading...

Posted in Agile Methodology, Seeker | No Comments »

 

What Are the Cost Savings and Business Benefits of the Seeker IAST Tool?

The Total Economic Impact™ Of Seeker®-Interactive Application Security Testing (IAST) by Synopsys, a December 2016 commissioned study conducted by Forrester Consulting on behalf of Synopsys, examines the potential return on investment (ROI) that enterprises may realize by deploying Seeker. The study provides readers with a framework to: Evaluate the potential financial impact of Seeker on […]

Continue Reading...

Posted in Interactive Application Security Testing (IAST), Seeker | Comments Off on What Are the Cost Savings and Business Benefits of the Seeker IAST Tool?

 

Synopsys Expands Security Signoff Solution with Cigital and Codiscope Acquisition

Today Synopsys signed a definitive agreement to acquire two premiere security companies. Cigital, headquartered in Dulles, Virginia, is a large application security firm specializing in professional and managed services for identifying, remediating, and preventing vulnerabilities in software applications. Codiscope, headquartered in Boston, Massachusetts, is focused on security developer tools and training modules, which Cigital distributes. […]

Continue Reading...

Posted in Seeker | Comments Off on Synopsys Expands Security Signoff Solution with Cigital and Codiscope Acquisition

 

Agile Development for Application Security Managers

In today’s competitive business environment, it is more important than ever to develop applications not only accurately but quickly. The traditional “waterfall” method is effective, but requires so many steps that the process cannot keep up with today’s software development needs. Agile is a development methodology that speeds up software development dramatically, along with several […]

Continue Reading...

Posted in Seeker | Comments Off on Agile Development for Application Security Managers

 

A Gathering of the Superstars of Security Research

In a panel discussion at CodenomiCON 2016, industry representatives and security experts discuss the major security events of the last year. Moderating the discussion was Kim Zetter, author of Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. Panelists included Matthew Carpenter, Principal Security Researcher, Grimm (SMFS, Inc.); Dr. Jared […]

Continue Reading...

Posted in Seeker | Comments Off on A Gathering of the Superstars of Security Research

 

Synopsys Presented at Les Assises for the Second Consecutive Year

With over 2,000 experts and professionals from the French cybersecurity scene participating, Les Assises de la Sécurité et des Systèmes d’Informations is one of the most important event for CISOs and other decision makers in the IT security space. For its 16th edition, Les Assises invited all market players for 3 days of talks, workshops, and […]

Continue Reading...

Posted in Seeker | Comments Off on Synopsys Presented at Les Assises for the Second Consecutive Year

 

Five Software Licenses You Need to Understand

There are different types of software licenses with some requiring you to make your source code public. Do you know what’s in your software? If you wrote the software yourself, the answer would be yes. But, if you’re like most people, you probably only wrote a portion of it. Industry practices vary but studies do […]

Continue Reading...

Posted in Seeker | Comments Off on Five Software Licenses You Need to Understand

 

New Study Finds Static Analysis and Fuzz Testing From Synopsys Can Save Millions In Remediation Costs

By integrating testing early in the software development lifecycle, organizations may realize a high ROI. Earlier this year, Synopsys commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) case study for an organization deploying Coverity, a static code analysis solution, and Defensics, an intelligent fuzzing solution. The goal of Forrester’s independent TEI study was […]

Continue Reading...

Posted in Seeker | Comments Off on New Study Finds Static Analysis and Fuzz Testing From Synopsys Can Save Millions In Remediation Costs

 

Protecode SC Scans Over One Million Applications

On Tuesday, Protecode SC, the online software composition analysis product from Synopsys, scanned its one millionth customer submitted app. “This is a significant milestone,” said David Chartier, VP of Marketing, Synopsys Software Integrity Group. “This is a strong showing of scalability and widespread adoption of Protecode SC and of it’s ability to meet the demands […]

Continue Reading...

Posted in Seeker | Comments Off on Protecode SC Scans Over One Million Applications

 

Why There Are At Least 6,000 Vulnerabilities Without CVE IDs

A new investigation suggests that up to six thousand software vulnerabilities lack CVE-ID. In a rather long article in CSO, Steve Ragan explains that in 2015 alone there were 6,356 vulnerabilities disclosed to the public that didn’t receive a CVE-ID. Ragan bases his claim on the fact that another vulnerability database, VulnDB, shows 14,914 vulnerabilities […]

Continue Reading...

Posted in Seeker | Comments Off on Why There Are At Least 6,000 Vulnerabilities Without CVE IDs