unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How to integrate automated AST tools in your CI/CD pipeline
Posted by on Wednesday, February 3rd, 2021...
2021-02-03 23:45:00 | 阅读: 330 |
收藏
|
www.synopsys.com
security
analysis
developers
integrate
software
AppSec Decoded: Manufacturing more-secure IoT devices
2021-02-02 04:41:14 | 阅读: 265 |
收藏
|
www.synopsys.com
security
appsec
decoded
software
Securing your code: GDPR best practices for application security
GDPR best practices often focus on how to process and manage personal data, but companies should a...
2021-01-29 00:45:00 | 阅读: 274 |
收藏
|
www.synopsys.com
security
software
ashworth
classify
encryption
Discovery capabilities: A core differentiator for Black Duck SCA
Stay on top of open source vulnerabilities and license obligations with discovery capabilities fro...
2021-01-27 02:00:59 | 阅读: 235 |
收藏
|
www.synopsys.com
duck
security
software
analysis
How to manage open source risks using Black Duck SCA
Posted by on Monday, January 25th, 2021...
2021-01-25 23:20:59 | 阅读: 367 |
收藏
|
www.synopsys.com
duck
software
security
development
analysis
How to cyber security: Faceplanting in 10 lines of code
Failure to address security early in the software development life cycle can increase business ris...
2021-01-23 02:00:00 | 阅读: 365 |
收藏
|
www.synopsys.com
software
security
development
faceplant
developers
How to evaluate the ROI of your software security program
The ROI of software security is difficult to calculate when the goal is to avoid a breach. Learn w...
2021-01-22 01:30:00 | 阅读: 332 |
收藏
|
www.synopsys.com
security
software
roi
rao
investment
Demystifying CVSS Scoring
The Common Vulnerability Scoring System (CVSS) can help you navigate the constantly growing ocean...
2021-01-20 02:15:00 | 阅读: 264 |
收藏
|
www.synopsys.com
scores
metric
temporal
attacker
Assessing design quality for better software due diligence
Posted by on Wednesday, January 13th, 2021...
2021-01-14 01:00:00 | 阅读: 283 |
收藏
|
www.synopsys.com
software
codebase
developers
diligence
identify
Forrester recognizes Synopsys as a leader in static application security testing
Posted by on Monday, January 11th, 2021...
2021-01-12 00:50:21 | 阅读: 273 |
收藏
|
www.synopsys.com
security
coverity
forrester
software
developers
What is the cost of poor software quality in the U.S.?
The total cost of poor software quality in the U.S. is estimated at $2.08 trillion. Learn what con...
2021-01-06 23:05:00 | 阅读: 382 |
收藏
|
www.synopsys.com
software
security
trillion
poor
Don’t get overwhelmed with trivial defects. Manage them!
Misuse of security tools can lead to defect overload for development teams. Knowing when and how t...
2021-01-05 02:33:07 | 阅读: 262 |
收藏
|
www.synopsys.com
security
analysis
development
rao
defect
AppSec Decoded: Threats to IoT devices and the role of government regulation
Posted by on Wednesday, December 30th, 2020...
2020-12-31 01:00:00 | 阅读: 250 |
收藏
|
www.synopsys.com
threats
appsec
security
mackey
decoded
DevSecOps: The good, the bad, and the ugly
DevSecOps offers benefits—but it also has its challenges. Learn why companies are making the shift...
2020-12-29 02:00:00 | 阅读: 265 |
收藏
|
www.synopsys.com
security
development
processes
sdlc
developers
CyRC analysis: Authentication bypass vulnerability in Bouncy Castle
Posted by on Thursday, December 17th, 2020...
2020-12-17 22:32:56 | 阅读: 292 |
收藏
|
www.synopsys.com
bouncy
castle
bypass
software
How to cyber security: Software security is everyone’s responsibility
Posted by on Wednesday, December 16th, 2020...
2020-12-17 02:07:58 | 阅读: 288 |
收藏
|
www.synopsys.com
security
software
somebody
network
weaknesses
How to build a serial port fuzzer with Defensics SDK
Defensics SDK makes fuzz testing possible for custom protocols. Learn how to create a custom injec...
2020-12-15 01:00:38 | 阅读: 344 |
收藏
|
www.synopsys.com
injector
defensics
serialport
library
Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol
In part two of this series, learn how to create a data model for the Bitcoin network protocol and...
2020-12-11 03:00:24 | 阅读: 304 |
收藏
|
www.synopsys.com
payload
defensics
octet
bitcoind
sha256x2
Six key findings from the ‘DevSecOps Practices and Open Source Management in 2020’ report
Posted by on Tuesday, December 8th, 2020...
2020-12-08 23:30:02 | 阅读: 299 |
收藏
|
www.synopsys.com
security
development
respondents
software
pain
Gazing into the crystal ball: A look at 2021 software security predictions
Experts share their 2021 software security predictions about DevSecOps adoption, the risks of soci...
2020-12-08 01:26:54 | 阅读: 262 |
收藏
|
www.synopsys.com
security
software
cloud
ransomware
remote
Previous
17
18
19
20
21
22
23
24
Next