SlideShare a Scribd company logo
1 of 15
Open Source Insight:
Synopsys Moves into Open Source Security with
Black Duck Acquisition
Fred Bals | Senior Content Writer/Editor
Cybersecurity News This Week
Big news for Open Source Insight’s publisher as electronic design automation
(EDA) and semiconductor IP company, Synopsys, announced its intention to
acquire Black Duck Software to extend the firm's product offerings into open
source security. This week’s newsletter includes an open letter from Black Duck
CEO Lou Shipley on why the Synopsys/Black Duck deal makes sense for or both
sides as well as for Black Duck customers, partners and employees.
In other open source security and cybersecurity news: Black Duck data scientist
Nathan (Yiming) Zhang looks at the ongoing race between hackers and the NVD.
Technology evangelist Tim Mackey explains why good containers (sometimes) go
bad. Steven Zimmerman, shares insights from his recent visit to the Automotive
Cybersecurity Summit. And a look into why the future of cybersecurity hangs on
automation.
• Synopsys to Enhance Software Integrity Platform
with Acquisition of Black Duck Software
• Saying "Yes" to Synopsys Right Move at Right
Time For Black Duck
• Black Duck's Open (Source) Truth: 'When Good
Containers Go Bad'
• How Retailers Must Increase Web Security Before
Holiday Shopping
Open Source News
More Open Source News
• 3 Takeaways from the Automotive Cybersecurity Summit
• SAVE Act Attempts to Bolster Election Security
• Open Source Cloud Storage Firm Finds Unsettling Number
of Unpatched Instances Online
• The Future of Cybersecurity Part II: The Need for
Automation
• The Race Is On: Do Hackers Publishing Exploits Beat NVD?
via Synopsys press release: Synopsys, Inc. (Nasdaq:
SNPS) and Black Duck Software, Inc. have signed a
definitive agreement for Synopsys to acquire privately held
Black Duck, a leader in automated solutions for securing and
managing open source software. The addition of Black
Duck's highly respected Software Composition Analysis
solution will enhance Synopsys' efforts in the software
security market by broadening its product offering and
expanding its customer reach.
Synopsys to Enhance Software Integrity Platform
with Acquisition of Black Duck Software
Saying "Yes" to Synopsys Right
Move at Right Time For Black Duck
via Black Duck blog (Lou Shipley): Saying “yes” is in the best
interests of our customers, who will have access to a wider array
of security solutions from a single trusted vendor; in the best
interests of our large and patient investors who funded Black Duck
in its earliest days more than a decade ago; and in the best
interests of our individual shareholders, the majority of whom are
employees.
via Computer Weekly: Black Duck Software
technology evangelist Tim Mackey explains why
you need to understand what information
attackers use to design their attacks when
defending against attack at scale.
Black Duck's Open (Source) Truth: 'When
Good Containers Go Bad'
How Retailers Must Increase Web
Security Before Holiday Shopping
via Security Boulevard: Criminals are expected to try and hijack
customer and employee accounts, break into online platforms through
code vulnerabilities and launch distributed denial-of-service attacks
against shopping websites.
via Black Duck blog (Steven
Zimmerman): And then I saw an autonomous
vehicle slowing to a stop at a traffic light, turn
signal blinking and LIDAR emitter twirling, with a
driver sipping coffee and eating a pastry behind
the wheel, and realized I was observing the
natural extension of the software-enabled trek I’d
just completed to the 2017 Automotive
Cybersecurity Summit.
3 Takeaways from the Automotive
Cybersecurity Summit
SAVE Act Attempts to Bolster Election Security
via Tech Target: Two senators introduced a bipartisan election
security bill called the SAVE Act, which aims to improve voting
infrastructure and harden state systems against attack.
via Data Center Knowledge: The open source file
sharing project scanned the web to find numerous
vulnerable and unpatched instances of its software on
critical websites.
Open Source Cloud Storage Firm Finds Unsettling
Number of Unpatched Instances Online
The Future of Cybersecurity Part II: The Need
for Automation
via CSO Online: Vendors are adding open source capabilities to their
tools to add much needed IT infrastructure flexibility. The more tools
and devices organizations add to their IT infrastructure, the more
unique an ecosystem becomes. That is why open source fits more
complex environments.
via Black Duck blog (Nathan (Yiming)
Zhang): Regardless how long it takes for NVD to
process a CVE after first disclosure in other
sources, there is a 76.19% chance that an exploit
will be publicly available days earlier.
The Race Is On: Do Hackers Publishing
Exploits Beat NVD?
Subscribe
Stay up to date on open source security and cybersecurity –
subscribe to our blog today.
Open Source Insight: Synopsys Moves into Open Source Security with Black Duck Acquisition

More Related Content

What's hot

2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report
Matthew Rosenquist
 
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
CODE BLUE
 
Cybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DBCybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DB
Sukumar Nayak
 

What's hot (20)

2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report2015 August - Intel Security McAfee Labs Quarterly Threat Report
2015 August - Intel Security McAfee Labs Quarterly Threat Report
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Evolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
Evolution of Offensive Testing - ATT&CK-based Adversary Emulation PlansEvolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
Evolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
 
Graph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for CybersecurityGraph Intelligence: The Essentials for Cybersecurity
Graph Intelligence: The Essentials for Cybersecurity
 
Hacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected DataHacked: Threats, Trends and the Power of Connected Data
Hacked: Threats, Trends and the Power of Connected Data
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT) 7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT)
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter LeeNEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
NEC Public Safety | Govware 2018 AI for Next Gen Cyber Defence by Walter Lee
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Cybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platformCybersecurity | Meta Networks: Software defined perimeter platform
Cybersecurity | Meta Networks: Software defined perimeter platform
 
Cybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DBCybersecurity-Serverless-Graph DB
Cybersecurity-Serverless-Graph DB
 
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
NUS-ISS Learning Day 2019-Intelligence on the (bleeding) edge fog bringing ai...
 
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 KeynoteData Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 Keynote
 
Your data is showing
Your data is showingYour data is showing
Your data is showing
 
Threat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & AcquisitionThreat Intelligence Data Collection & Acquisition
Threat Intelligence Data Collection & Acquisition
 

Similar to Open Source Insight: Synopsys Moves into Open Source Security with Black Duck Acquisition

Similar to Open Source Insight: Synopsys Moves into Open Source Security with Black Duck Acquisition (20)

Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...Open Source Insight:Container Tech, Data Centre Security & 2018's Biggest Se...
Open Source Insight: Container Tech, Data Centre Security & 2018's Biggest Se...
 
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...
 
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
Open Source Insight: Black Duck Now Part of Synopsys, Tackling Container Secu...
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
Open Source Insight: Black Duck Announces OpsSight for DevOps Open Source Sec...
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing ScamOpen Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
Open Source Insight: OWASP Top 10, Red Hat OpenShift News, & Gmail Phishing Scam
 
Open Source Insight: Hub Detect & DevOps, OSS for Cars & 1.8 M Voter Info Leaked
Open Source Insight: Hub Detect & DevOps, OSS for Cars & 1.8 M Voter Info LeakedOpen Source Insight: Hub Detect & DevOps, OSS for Cars & 1.8 M Voter Info Leaked
Open Source Insight: Hub Detect & DevOps, OSS for Cars & 1.8 M Voter Info Leaked
 
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Open Source Insight:  GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 

More from Black Duck by Synopsys

More from Black Duck by Synopsys (19)

Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
 
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
FLIGHT WEST 2018 Presentation - Continuous Monitoring of Open Source Componen...
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
FLIGHT WEST 2018 - Presentation - SCA 101: How to Manage Open Source Security...
 
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
FLIGHT WEST 2018 Presentation - Integrating Security into Your Development an...
 
Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018Open-Source- Sicherheits- und Risikoanalyse 2018
Open-Source- Sicherheits- und Risikoanalyse 2018
 
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your DealFLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
 
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
FLIGHT Amsterdam Presentation - Open Source License Management in the Black D...
 
FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub FLIGHT Amsterdam Presentation - From Protex to Hub
FLIGHT Amsterdam Presentation - From Protex to Hub
 
Open Source Rookies and Community
Open Source Rookies and CommunityOpen Source Rookies and Community
Open Source Rookies and Community
 
20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security20 Billion Reasons for IoT Security
20 Billion Reasons for IoT Security
 
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...Open Source Insight:IoT Security, Tech Due Diligence, and Software Security ...
Open Source Insight: IoT Security, Tech Due Diligence, and Software Security ...
 
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight:Banking and Open Source, 2018 CISO Report, GDPR LoomingOpen Source Insight:Banking and Open Source, 2018 CISO Report, GDPR Looming
Open Source Insight: Banking and Open Source, 2018 CISO Report, GDPR Looming
 
Open Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOpsOpen Source Insight: Balancing Agility and Open Source Security for DevOps
Open Source Insight: Balancing Agility and Open Source Security for DevOps
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 
Buyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech ContractsBuyer and Seller Perspectives on Open Source in Tech Contracts
Buyer and Seller Perspectives on Open Source in Tech Contracts
 
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the CloudShift Risk Left: Security Considerations When Migrating Apps to the Cloud
Shift Risk Left: Security Considerations When Migrating Apps to the Cloud
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Open Source Insight: Synopsys Moves into Open Source Security with Black Duck Acquisition

  • 1. Open Source Insight: Synopsys Moves into Open Source Security with Black Duck Acquisition Fred Bals | Senior Content Writer/Editor
  • 2. Cybersecurity News This Week Big news for Open Source Insight’s publisher as electronic design automation (EDA) and semiconductor IP company, Synopsys, announced its intention to acquire Black Duck Software to extend the firm's product offerings into open source security. This week’s newsletter includes an open letter from Black Duck CEO Lou Shipley on why the Synopsys/Black Duck deal makes sense for or both sides as well as for Black Duck customers, partners and employees. In other open source security and cybersecurity news: Black Duck data scientist Nathan (Yiming) Zhang looks at the ongoing race between hackers and the NVD. Technology evangelist Tim Mackey explains why good containers (sometimes) go bad. Steven Zimmerman, shares insights from his recent visit to the Automotive Cybersecurity Summit. And a look into why the future of cybersecurity hangs on automation.
  • 3. • Synopsys to Enhance Software Integrity Platform with Acquisition of Black Duck Software • Saying "Yes" to Synopsys Right Move at Right Time For Black Duck • Black Duck's Open (Source) Truth: 'When Good Containers Go Bad' • How Retailers Must Increase Web Security Before Holiday Shopping Open Source News
  • 4. More Open Source News • 3 Takeaways from the Automotive Cybersecurity Summit • SAVE Act Attempts to Bolster Election Security • Open Source Cloud Storage Firm Finds Unsettling Number of Unpatched Instances Online • The Future of Cybersecurity Part II: The Need for Automation • The Race Is On: Do Hackers Publishing Exploits Beat NVD?
  • 5. via Synopsys press release: Synopsys, Inc. (Nasdaq: SNPS) and Black Duck Software, Inc. have signed a definitive agreement for Synopsys to acquire privately held Black Duck, a leader in automated solutions for securing and managing open source software. The addition of Black Duck's highly respected Software Composition Analysis solution will enhance Synopsys' efforts in the software security market by broadening its product offering and expanding its customer reach. Synopsys to Enhance Software Integrity Platform with Acquisition of Black Duck Software
  • 6. Saying "Yes" to Synopsys Right Move at Right Time For Black Duck via Black Duck blog (Lou Shipley): Saying “yes” is in the best interests of our customers, who will have access to a wider array of security solutions from a single trusted vendor; in the best interests of our large and patient investors who funded Black Duck in its earliest days more than a decade ago; and in the best interests of our individual shareholders, the majority of whom are employees.
  • 7. via Computer Weekly: Black Duck Software technology evangelist Tim Mackey explains why you need to understand what information attackers use to design their attacks when defending against attack at scale. Black Duck's Open (Source) Truth: 'When Good Containers Go Bad'
  • 8. How Retailers Must Increase Web Security Before Holiday Shopping via Security Boulevard: Criminals are expected to try and hijack customer and employee accounts, break into online platforms through code vulnerabilities and launch distributed denial-of-service attacks against shopping websites.
  • 9. via Black Duck blog (Steven Zimmerman): And then I saw an autonomous vehicle slowing to a stop at a traffic light, turn signal blinking and LIDAR emitter twirling, with a driver sipping coffee and eating a pastry behind the wheel, and realized I was observing the natural extension of the software-enabled trek I’d just completed to the 2017 Automotive Cybersecurity Summit. 3 Takeaways from the Automotive Cybersecurity Summit
  • 10. SAVE Act Attempts to Bolster Election Security via Tech Target: Two senators introduced a bipartisan election security bill called the SAVE Act, which aims to improve voting infrastructure and harden state systems against attack.
  • 11. via Data Center Knowledge: The open source file sharing project scanned the web to find numerous vulnerable and unpatched instances of its software on critical websites. Open Source Cloud Storage Firm Finds Unsettling Number of Unpatched Instances Online
  • 12. The Future of Cybersecurity Part II: The Need for Automation via CSO Online: Vendors are adding open source capabilities to their tools to add much needed IT infrastructure flexibility. The more tools and devices organizations add to their IT infrastructure, the more unique an ecosystem becomes. That is why open source fits more complex environments.
  • 13. via Black Duck blog (Nathan (Yiming) Zhang): Regardless how long it takes for NVD to process a CVE after first disclosure in other sources, there is a 76.19% chance that an exploit will be publicly available days earlier. The Race Is On: Do Hackers Publishing Exploits Beat NVD?
  • 14. Subscribe Stay up to date on open source security and cybersecurity – subscribe to our blog today.