Learn about the ins and outs of fuzzing, how to secure your DevOps pipeline with Synopsys and Red Hat, and what ISO/SAE 21434 means for automotive security.
The Ins and Outs of Fuzzing
“Another day, another data breach” is not just a cliché; it’s a reality. But all data breaches are not equal. To avoid becoming the next victim, you must create software that’s more secure, higher quality, and compliant with standards.
This webinar will introduce you to the concept of fuzzing, as well as Synopsys’ best-of-breed fuzzing solution, Defensics. Fuzzing is well established as an excellent technique for locating vulnerabilities in software. Register for this webinar to learn:
- What fuzzing is, how it works, and when and why you should use it
- How various fuzzing approaches differ and the pros and cons of each
- How Defensics uses generational / specification-based fuzzing to test over 250 protocols effectively and efficiently
When: Tuesday, May 26 @ 11 a.m. Eastern / 8 a.m. Pacific
Who: Kimm Yeo, Product Marketing Manager, Synopsys; Rikke Kuipers, Product Manager, Synopsys
Secure Your ‘Dev’ and ‘Ops’ Pipeline With Synopsys and Red Hat
Synopsys and Red Hat team up once again to bring you the best-in-class solution to secure your “Dev” and “Ops” pipeline without compromising speed. Red Hat’s secure-by-design OpenShift platform provides operations teams with an out-of-the-box secure Kubernetes deployment, and Synopsys application security tools ensure development teams build secure applications and images with high quality. Combining the capabilities of Red Hat and Synopsys is key in making sure that deployed applications are less susceptible to attacks.
Join the experts from Red Hat and Synopsys as they present these topics:
- Augmenting Red Hat’s secure-by-design OpenShift platform
- Consolidating containerized application security perspectives
- Integrating Synopsys’ application security testing (AST) solutions into Tekton-based OpenShift Pipelines
- Application and host container security with CoreOS, Quay, and Black Duck
- Reducing false positives by combining security feeds with OVAL, RHSA, and BDSA
When: Wednesday, May 27 @ 1 p.m. Eastern / 10 a.m. Pacific
Who: Gautam Baghel, Global Technical Alliances, Synopsys; Dave Meurer, Partner Solutions Architect, Red Hat
Secure Automotive Software Development in the Age of ISO/SAE 21434
Modern vehicles run on software containing more than 150 million lines of code. As a result of more advanced safety-relevant functionality, such as ADAS and autonomous driving, as well as new communication interfaces, mobile apps, and back-end servers based on connected car use cases, the need for developing secure systems in the automotive industry is higher than ever. A draft of the new cyber security standard ISO/SAE 21434 was recently released to help automotive companies address cyber security for the entire vehicle life cycle.
This talk presents cyber security activities in the software development process based on ISO/SAE 21434 to help automotive companies develop more secure systems. We’ll provide examples of what is required from a resources and tools perspective to ensure an efficient and practical implementation of the various cyber security steps in the development process.
When: Thursday, May 28 @ 11 a.m. Eastern / 8 a.m. Pacific
Who: Dr. Dennis Kengo Oka, Principal Automotive Security Strategist, Synopsys
*** This is a Security Bloggers Network syndicated blog from Software Integrity Blog authored by Synopsys Editorial Team. Read the original post at: https://www.synopsys.com/blogs/software-security/webinars-may-25-29/