CyRC Vulnerability Advisory: Denial-of-service vulnerabilities in Zephyr Bluetooth LE stack

CyRC Vulnerability Advisory: Denial-of-service vulnerabilities in Zephyr Bluetooth LE stack

Eight vulnerabilities were discovered in Zephyr’s Bluetooth LE Stack using Defensics Bluetooth LE fuzzing solution. The post CyRC Vulnerability Advisory: Denial-of-service vulnerabilities in Zephyr Bluetooth LE stack appeared first on Software Integrity ...
Security at speed: Justifying your security program transformation using key development motivators

Security at speed: Justifying your security program transformation using key development motivators

Security investments require executive buy-in. Learn what key development motivators can help justify your security program updates. The post Security at speed: Justifying your security program transformation using key development motivators appeared ...
Neil Daswani talks about his big breaches book and the BSIMM

Neil Daswani talks about his big breaches book and the BSIMM

Dr. Neil Daswani discusses the root causes of today’s breaches and how the BSIMM can help companies achieve the right security habits. The post Neil Daswani talks about his big breaches book ...
supply chain security | Synopsys

Don’t be the weak link in your customers’ supply chain security

To solve the supply chain security dilemma, producers must get back to security basics. Get best practices for securing your supply chain. The post Don’t be the weak link in your customers’ ...
Don’t let supply chain security risks poison your organization

Don’t let supply chain security risks poison your organization

Supply chain security risks are not new, but recent headlines are a reminder for consumers to re-examine their security practices. The post Don’t let supply chain security risks poison your organization appeared ...
The roles and responsibilities that lead to better software security initiatives

The roles and responsibilities that lead to better software security initiatives

Effective software security initiatives require buy-in from many teams, but which roles are primarily responsible for creating and improving their success? The post The roles and responsibilities that lead to better software ...
BSIMM11 tracks top trends in market activity

BSIMM11 tracks top trends in market activity

Measure and improve your software security initiative using the four key market activity trends observed in the new BSIMM11 report. The post BSIMM11 tracks top trends in market activity appeared first on ...
BSIMM11: Tracking the cutting edge of software security initiatives

BSIMM11: Tracking the cutting edge of software security initiatives

BSIMM11 gathers research on software security activities from real-life firms to create a guide to help you navigate your software security initiative. The post BSIMM11: Tracking the cutting edge of software security ...
[Webinars] Static analysis best practices, remote security testing and training

[Webinars] Static analysis best practices, remote security testing and training

In this week’s webinars, we’ll share how to get the most out of your static analysis tool and how to make the transition from on-site to remote testing. The post [Webinars] Static ...
Are you following the top 10 software security best practices?

Are you following the top 10 software security best practices?

Software security isn’t simply plug-and-play. Our top 10 software security best practices show you how to get the best return on your investment. The post Are you following the top 10 software ...