Automotive threat analysis and risk assessment method

Automotive threat analysis and risk assessment method

The TARA method provides risk evaluation, assessment, treatment, and planning for identified risks. Learn how to apply this method to the ISO SAE 21434 standard. The post Automotive threat analysis and risk ...
Cyber security assurance levels in the automotive supply chain

Cyber security assurance levels in the automotive supply chain

With the ISO SAE 21434 standard for road vehicles coming soon, learn the role cyber security assurance levels play in your road vehicle safety program. The post Cyber security assurance levels in ...
Are you ready for ISO SAE 21434 Cybersecurity of Road Vehicles?

Are you ready for ISO SAE 21434 Cybersecurity of Road Vehicles?

Don’t let cyber security take a back seat in the vehicle life cycle. Learn how to prepare for the upcoming ISO SAE 21434 standard for road vehicles. The post Are you ready ...
Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

Cost of data breaches in 2019: The 4 worst hits on the corporate wallet

The cost of a data breach is expected to rise owing to GDPR, CCPA, and other privacy regulations. Here’s what the most expensive data breaches cost in 2019. The post Cost of ...
How the 2019 CWE Top 25 can boost your application security

How the 2019 CWE Top 25 can boost your application security

You can use the 2019 CWE Top 25 to help focus your application security efforts. Learn more about this list of the 25 most dangerous software weaknesses. The post How the 2019 ...
[Webinars] Evidence-based security, design and code quality in tech M&A

[Webinars] Evidence-based security, design and code quality in tech M&A

Learn how to improve software security using evidence-based standards, and why you should inspect design and code quality during technical due diligence. The post [Webinars] Evidence-based security, design and code quality in ...
Coverity release ties in well to the latest MITRE CWE Top 25

Coverity release ties in well to the latest MITRE CWE Top 25

MITRE’s 2019 CWE Top 25 list contains many code quality issues that can result in security vulnerabilities. Static analysis can help you mitigate them. The post Coverity release ties in well to ...
The False Claims Act: 156 years old and newly relevant to software security

The False Claims Act: 156 years old and newly relevant to software security

We recently saw the first settlement by a company charged under the False Claims Act for failing to meet cyber security standards. Is there more to come? The post The False Claims ...
Is Ireland too soft with GDPR enforcement, or just being prudent?

Is Ireland too soft with GDPR enforcement, or just being prudent?

Some are concerned by the lack of GDPR fines issued by Ireland, the lead regulator for many tech giants. But the country’s taking its time for good reason. The post Is Ireland ...
[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

[Webinar] Security by Obscurity: The Flip-Side of the Compliance Coin

In our software compliance webinar, Matan Scharf (Synopsys) explains the hidden security dangers of software standardization. Watch May 30 @ 10 a.m. Eastern. The post [Webinar] Security by Obscurity: The Flip-Side of ...