Developer buy-in key for application security

by Chris Bubinas • No Comments

Developer buy-in key for application security

It is very possible to maximize app development productivity without sacrificing security. The key to such success is the combination of best practices and tools with developer buy-in...

Read More »

Open source is secure, but only with proper tools and strategies

by Rod Cope • No Comments

Open source is secure, but only with proper tools and strategies

Open source solutions are typically just as secure, or even more secure, than licensed software. As is the case with any technology, though, security can only be achieved when pursued with the proper tools and strategies...

Read More »

New tools, strategies needed to deliver application development security

by Chris Bubinas • No Comments

New tools, strategies needed to deliver application development security

Two recent reports highlighted the extent of companies' application security shortcomings, suggesting the need for revised strategies and new tools...

Read More »

Code Matters: our new website makes coding, testing, & deploying easier

by Roy Sarkar • No Comments

Code Matters: our new website makes coding, testing, & deploying easier

[Here's a guest post from Christine Bottagaro, CMO, Rogue Wave Software] Our product set is broad and varied. And with last year’s acquisitions, it became clear we needed to tell a different story. A few years ago we rode the HPC horse, which...

Read More »

Security tests play a key role in successful health care app development

by Chris Bubinas • No Comments

Security tests play a key role in successful health care app development

Only by balancing security with usability can health care apps deliver functionality without compromising patient privacy...

Read More »

Detecting command injection flaws (like Shellshock)

by Roy Sarkar • No Comments

Detecting command injection flaws (like Shellshock)

In this follow up to our last article about Shellshock, we’ll take a look at an example of a command injection flaw and see how Klocwork detects it. As a refresher, a command injection flaw is the result of improper or incorrect...

Read More »

Static Analysis

Developer buy-in key for application security

November 17, 2014, Chris Bubinas - No Comments

Developer buy-in key for application security

It is very possible to maximize app development productivity without sacrificing security. The key to such success is the combination of best...

Software Security

Developer buy-in key for application security

November 17, 2014, Chris Bubinas - No Comments

Developer buy-in key for application security

It is very possible to maximize app development productivity without sacrificing security. The key to such success is the combination of best...

High Performance Computing

HPC demand growing around the world

November 20, 2014, Chris Gottbrath - No Comments

HPC demand growing around the world

Demand for HPC solutions is growing rapidly in South Africa, India, the U.S. and elsewhere...

Open Source

ThreadSpotter source code released to the community

November 14, 2014, Amanda Evans - No Comments

ThreadSpotter source code released to the community

The open source community is a valuable asset to software development. A place where people can share, learn, explore, and grow – an environment...

Embedded Software

Webinar recap: Static analysis’ role in automotive functional safety

July 24, 2014, Roy Sarkar - No Comments

Webinar recap: Static analysis’ role in automotive functional safety

Last week, we held a joint webinar with QNX Software Systems discussing how static analysis plays a key role in automotive functional safety and ISO...

Analytics & Data Mining

Data mining may prove critical for fighting Ebola and other outbreaks

November 21, 2014, Chris Bubinas - No Comments

Data mining may prove critical for fighting Ebola and...

New advances in data mining and analytics are helping firms to track and predict the behavior of Ebola, and may prove invaluable for fighting future...

Scroll to top