unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Optimizing software composition analysis for developer workflows with Black Duck Rapid Scan
Posted by on Wednesday, June 30th, 2021...
2021-07-01 04:02:20 | 阅读: 94 |
收藏
|
www.synopsys.com
security
developers
duck
violations
software
How to cyber security: Embedding security into every phase of the SDLC
Posted by on Monday, June 28th, 2021...
2021-06-29 00:30:00 | 阅读: 120 |
收藏
|
www.synopsys.com
software
security
sdlc
development
hydrogen
How an open source software audit works
Open source software audits can identify undetected issues in your codebase. Learn how our audit s...
2021-06-26 01:30:26 | 阅读: 91 |
收藏
|
www.synopsys.com
software
codebase
security
audits
auditors
CyRC Vulnerability Advisory: Denial-of-service vulnerabilities in Zephyr Bluetooth LE stack
Eight vulnerabilities were discovered in Zephyr’s Bluetooth LE Stack using Defensics Bluetooth LE...
2021-06-22 21:13:03 | 阅读: 114 |
收藏
|
www.synopsys.com
zephyr
l2cap
security
rtos
Security at speed: Justifying your security program transformation using key development motivators
Posted by on Friday, June 18th, 2021...
2021-06-19 03:57:45 | 阅读: 125 |
收藏
|
www.synopsys.com
security
motivators
development
improvement
justify
Reduce open source risk in M&A with software due diligence
2021-06-18 00:22:07 | 阅读: 126 |
收藏
|
www.synopsys.com
diligence
software
security
cyrc
Ransomware prevention begins with securing your applications
Ransomware prevention measures such as securing your applications can help you avoid becoming the...
2021-06-16 01:10:19 | 阅读: 152 |
收藏
|
www.synopsys.com
ransomware
software
security
development
network
Data privacy laws drive urgency to create a data security strategy
With the introduction of more data privacy laws, companies can use a data security strategy and fr...
2021-06-15 00:00:00 | 阅读: 136 |
收藏
|
www.synopsys.com
security
laws
california
guidelines
residents
How to achieve MISRA and AUTOSAR coding compliance
Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security...
2021-06-11 00:14:38 | 阅读: 200 |
收藏
|
www.synopsys.com
misra
software
guidelines
autosar
security
Code Dx brings game-changing capabilities to Synopsys
Posted by on Tuesday, June 8th, 2021...
2021-06-08 22:10:00 | 阅读: 112 |
收藏
|
www.synopsys.com
security
software
portfolio
analysis
appsec
CyRC Vulnerability Advisory: Denial of service vulnerabilities in RabbitMQ, EMQ X, and VerneMQ
Posted by on Tuesday, June 8th, 2021...
2021-06-08 21:00:00 | 阅读: 132 |
收藏
|
www.synopsys.com
vernemq
22116
rabbitmq
emq
33176
Web application security testing at scale with Coverity SAST
Posted by on Monday, June 7th, 2021...
2021-06-07 23:30:00 | 阅读: 143 |
收藏
|
www.synopsys.com
security
coverity
development
developer
Announcing Synopsys as an OpenChain Project third-party certifier
Posted by on Friday, June 4th, 2021...
2021-06-05 00:25:53 | 阅读: 141 |
收藏
|
www.synopsys.com
openchain
software
5230
security
iec
Addressing 5G security with threat modeling
Posted by on Wednesday, June 2nd, 2021...
2021-06-03 00:00:55 | 阅读: 123 |
收藏
|
www.synopsys.com
network
security
software
agility
Synopsys named a Leader in the 2021 Gartner Magic Quadrant for Application Security Testing for the fifth year
Posted by on Tuesday, June 1st, 2021...
2021-06-02 00:09:58 | 阅读: 230 |
收藏
|
www.synopsys.com
security
software
development
developers
portfolio
Seeker and Red Hat: Security and speed come together
Learn how the Seeker and Red Hat integration helps deliver security and speed of software developm...
2021-05-27 01:00:00 | 阅读: 141 |
收藏
|
www.synopsys.com
seeker
security
software
baghel
development
A CISO’s guide to sensitive data protection
Posted by on Tuesday, May 25th, 2021...
2021-05-26 01:04:58 | 阅读: 159 |
收藏
|
www.synopsys.com
software
security
consumers
laws
development
How to protect your Wi-Fi devices from new FragAttacks vulnerabilities
Posted by on Monday, May 24th, 2021...
2021-05-24 23:30:00 | 阅读: 180 |
收藏
|
www.synopsys.com
suites
frames
fragattacks
defensics
How to cyber security: Leverage AST solution data to make risk-based decisions
AST solutions provide insights to help organizations make more-informed decisions about their secu...
2021-05-21 00:01:56 | 阅读: 152 |
收藏
|
www.synopsys.com
security
portfolio
dashboards
software
development
How to remove friction in DevOps with Intelligent Orchestration partner integrations
Explore the Intelligent Orchestration partner integrations for CloudBees Jenkins, GitHub Actions,...
2021-05-18 22:07:32 | 阅读: 160 |
收藏
|
www.synopsys.com
intelligent
security
jenkins
sonarqube
Previous
14
15
16
17
18
19
20
21
Next