unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Things to consider when choosing a software composition analysis tool
Posted by on Friday, December 4th, 2020...
2020-12-05 01:00:00 | 阅读: 287 |
收藏
|
www.synopsys.com
security
software
analysis
composition
development
Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network
This is the first part of a two-part advanced technical tutorial that describes how you can use th...
2020-12-03 04:00:16 | 阅读: 269 |
收藏
|
www.synopsys.com
network
bitcoind
defensics
fleur
machine
Configure security tools for effective DevSecOps
Managing security vulnerabilities and false positives is a challenge in today’s DevSecOps environm...
2020-12-01 03:00:03 | 阅读: 290 |
收藏
|
www.synopsys.com
security
defect
analysis
rao
AppSec Decoded: The consequences of insecure IoT devices
2020-11-26 01:00:03 | 阅读: 282 |
收藏
|
www.synopsys.com
security
software
appsec
development
20/20 hindsight shows that foresight wasn’t 20/20
In a year marked by unprecedented challenges, we revisit the 2020 cyber security predictions to se...
2020-11-25 01:03:03 | 阅读: 276 |
收藏
|
www.synopsys.com
security
declared
ransomware
cloud
everybody
Four requirements for open source vulnerability management in a DevOps environment
Most applications contain open source code, which can expose companies to risks if left unchecked....
2020-11-21 00:45:00 | 阅读: 329 |
收藏
|
www.synopsys.com
software
security
duck
Automotive threat analysis and risk assessment method
Posted by on Wednesday, November 18th, 2020...
2020-11-19 01:30:00 | 阅读: 381 |
收藏
|
www.synopsys.com
tara
ratings
impacts
security
calculation
Can your security keep pace in a DevOps environment?
There’s a growing need for both security and speed in application development. DevSecOps introduce...
2020-11-17 02:30:00 | 阅读: 310 |
收藏
|
www.synopsys.com
security
software
jarzombek
development
How to cyber security: Gotta go fast … but why?
DevSecOps allows organizations to deliver applications at a high velocity using iteration and auto...
2020-11-13 02:00:00 | 阅读: 270 |
收藏
|
www.synopsys.com
software
security
development
waterfall
giant
The roles and responsibilities that lead to better software security initiatives
Effective software security initiatives require buy-in from many teams, but which roles are primar...
2020-11-11 01:00:00 | 阅读: 345 |
收藏
|
www.synopsys.com
security
software
bsimm
ssi
ssg
Three DevSecOps challenges and how to mitigate them
Posted by on Monday, November 9th, 2020...
2020-11-10 02:45:00 | 阅读: 287 |
收藏
|
www.synopsys.com
security
development
appsec
developers
developer
Cyber security assurance levels in the automotive supply chain
Posted by on Thursday, November 5th, 2020...
2020-11-06 02:00:00 | 阅读: 350 |
收藏
|
www.synopsys.com
security
assurance
goals
road
electrical
New survey shows integrating application security testing gaining traction in DevOps
DevOps can break traditional application security testing processes & tools. Learn why an integrat...
2020-11-03 01:15:00 | 阅读: 343 |
收藏
|
www.synopsys.com
security
software
development
integrating
developers
How to make the future IoT more secure
IoT security begins with building secure software. Learn how to embed security into your SDLC to a...
2020-10-30 01:00:00 | 阅读: 313 |
收藏
|
www.synopsys.com
security
software
development
sdlc
CyRC analysis: Circumventing WPA authentication in wireless routers with Defensics fuzz testing
Posted by on Wednesday, October 28th, 2020...
2020-10-29 00:15:00 | 阅读: 287 |
收藏
|
www.synopsys.com
client
wpa3
pairwise
wpa
network
How To Cyber Security: Put the Sec in DevOps with Intelligent Orchestration
DevSecOps is a team effort. Learn how to build security into DevOps to deliver secure, high-qualit...
2020-10-28 00:00:01 | 阅读: 272 |
收藏
|
www.synopsys.com
security
development
software
analysis
AppSec Decoded: The security dilemma of IoT devices
Posted by on Wednesday, October 21st, 2020...
2020-10-22 03:11:52 | 阅读: 313 |
收藏
|
www.synopsys.com
mce
security
bookmark
selres
Get effective DevSecOps with version control
Learn how to use version control to reduce development time and increase the rate of successful so...
2020-10-20 01:01:36 | 阅读: 325 |
收藏
|
www.synopsys.com
developers
security
development
rao
software
Synopsys’ Seeker IAST wins Best Cloud and Web Application Security category at CybersecAsia Awards
Posted by on Friday, October 16th, 2020...
2020-10-17 00:00:00 | 阅读: 321 |
收藏
|
www.synopsys.com
seeker
security
cloud
development
Making SCA part of your AST Strategy
Posted by on Thursday, October 15th, 2020...
2020-10-16 00:59:25 | 阅读: 296 |
收藏
|
www.synopsys.com
software
security
development
bom
stages
Previous
18
19
20
21
22
23
24
25
Next