[Webinars] Open source security, remote security testing, secure development

Learn more about the 2020 OSSRA report, guidelines and solutions for remote security testing, and why all software development should be secure development.

Register for our 2020 OSSRA webinar

Lessons on Open Source Governance From the 2020 OSSRA Report

The 2020 Open Source Security and Risk Analysis report looks at the state of open source use in over 1,250 distinct applications created by organizations in 17 industries. As we’ve seen in past years, the use of open source in commercial applications continues to grow, and businesses of all sizes are now powered by open source software. Whether your organization uses open source intentionally or via commercial vendors, understanding how open source communities update their software is a key factor when planning any cyber security response plan. In this webinar, we’ll walk through the findings from the 2020 OSSRA report with an eye on how teams can use the data to inform their overall open source governance plans.

What: Lessons on Open Source Governance From the 2020 OSSRA Report

When: Wednesday, May 13 @ 11:30 a.m. Eastern / 8:30 a.m. Pacific

Who: Tim Mackey, Principal Security Strategist, Synopsys

Register now

Register for our remote security testing webinar

Remote Security Testing & Training: Busting Myths and Offering Solutions

While digital transformation and BYOD have allowed many IT activities to occur remotely, many enterprises still prefer to perform security testing on-site. Concerns about data security, network/application accessibility, assessment quality, and project management have discouraged teams from making the leap to remote testing.

In this webinar, we draw on lessons learned from many years of delivering managed application security services to provide guidelines on addressing these concerns and offer solutions for conducting remote security testing and security training.

What: Remote Security Testing & Training: Busting Myths and Offering Solutions

When: Thursday, May 14 @ 9 a.m. BST

Who: Sandesh Mysore Anand, Managing Consultant, Synopsys; Rakshitha R. Rao, Security Consultant, Synopsys

Register now

Register for our security automation webinar

That’s Not How This Works

All Development Should Be Secure Development

Development teams are pressured to push new software out quickly. But with speed comes risk. Anyone can write software, but if you want to create software that is safe, secure, and robust, you need the right process. Register for this webinar to learn:

  • Why traditional approaches to software development usually end in tears and heartburn
  • How a structured approach to secure software development lowers risk for you and your customers
  • Why automation and security testing tools are key components in the implementation of a secure development life cycle

What: That’s Not How This Works: All Development Should Be Secure Development

When: Tuesday, May 12 @ 8 a.m. BST

Who: Jonathan Knudsen, Technical Marketing Manager, Synopsys

Register now

*** This is a Security Bloggers Network syndicated blog from Software Integrity Blog authored by Synopsys Editorial Team. Read the original post at:

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)