
Synopsys Software Integrity Group
-

There were a few massive breaches this week involving prominent names in the market. Cyber security experts weigh in their professional views on the matters. AT&T breach – 51 million customers affected By: Thomas Richards, Principal Security Consultant within the Synopsys Software Integrity Group While the information that was exposed doesn’t directly have sensitive information, it…
-

Cybersecurity experts have shared their thoughts on the recent wave of cyber attacks. Here’s what they had to say. Indonesian Data Centre Attack “Protecting critical infrastructure from cyberattacks is as important as protecting it from physical attacks, because the consequences can be equally disastrous. The recent cyber attack on Indonesia’s national data centre serves as…
-

Synopsys, Inc. unveiled Polaris Assist, a new AI-powered application security assistant integrated into its Synopsys Polaris Software Integrity Platform®. The tool leverages advanced Large Language Model (LLM) technology combined with decades of Synopsys’ expertise in application security to provide developers and security teams with comprehensive summaries of detected vulnerabilities, AI-generated code fix recommendations, and other…
-

Comments by: Thomas Richards, Principal Security Consultant, Synopsys Software Integrity Group The recent phishing campaign impersonating the US Department of Labor demonstrates a high level of sophistication compared to other phishing campaigns witnessed in the wild. The entity responsible for the campaign has made careful preparations to ensure their attacks are delivered as planned and are successful. This…
-

Comments by: Chris Clark, Senior Manager at Synopsys Software Integrity Group Automotive manufacturers go to great lengths to keep next model year vehicles from prying eyes and the same is true for data, especially R&D data. Protecting key assets like research data is especially critical in a high-intensity market like automotive. The drive to reduce 200…
-

But like all programming languages, Python is not immune to security threats. Secure coding best practices must be adopted to avoid risks from attackers. In this article, we’ll explore Python security best practices that should employed when building secure application.
-

Comments by: Thomas Richards, Principal Security Consultant, Synopsys Software Integrity Group Compromised credentials continue to be the most likely entry point into a target organisation’s network. To protect against such attacks, organisations should take proactive steps to enable multi-factor authentication on all externally accessible services and applications. Additionally, there are services that can be used…
-

Comments by: Ian Hall, Head of Client Services, APAC, at Synopsys Software Integrity Group Thanks to the COVID-19 pandemic, governments across the world have rushed to develop apps – for track-and-trace, vaccine passports, tracking users in quarantine and more. However, with the rush security is oftentimes not in the forefront of developers’ minds and this…
-

Comments by: Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group Security and usability are frequently adversaries. For a good user experience, the Windows operating system runs installer programs when you plug in a new piece of hardware, like a keyboard or a mouse. In this instance, the problem was that the Razer installer program wasn’t sufficiently…
-

By: Debrup Ghosh, Senior Product Manager, Synopsys Software Integrity Group IoT devices are ubiquitous in our daily lives — whether it’s at home with connected home automation devices, or at work with connected factories, hospitals, and even connected cars. According to Gartner, there were over 20 billion IoT devices in 2020. As businesses globally over the…

You must be logged in to post a comment.