Evolving, multiplying threats demand superior application security efforts

by Chris Bubinas • No Comments

Evolving, multiplying threats demand superior application security efforts

The only way for companies to protect themselves while continuing to take advantage of application development is by embracing new, advanced security tools, such as static code analysis solutions...

Read More »

Developer buy-in key for application security

by Chris Bubinas • No Comments

Developer buy-in key for application security

It is very possible to maximize app development productivity without sacrificing security. The key to such success is the combination of best practices and tools with developer buy-in...

Read More »

Open source is secure, but only with proper tools and strategies

by Rod Cope • No Comments

Open source is secure, but only with proper tools and strategies

Open source solutions are typically just as secure, or even more secure, than licensed software. As is the case with any technology, though, security can only be achieved when pursued with the proper tools and strategies...

Read More »

New tools, strategies needed to deliver application development security

by Chris Bubinas • No Comments

New tools, strategies needed to deliver application development security

Two recent reports highlighted the extent of companies' application security shortcomings, suggesting the need for revised strategies and new tools...

Read More »

Security tests play a key role in successful health care app development

by Chris Bubinas • No Comments

Security tests play a key role in successful health care app development

Only by balancing security with usability can health care apps deliver functionality without compromising patient privacy...

Read More »

Detecting command injection flaws (like Shellshock)

by Roy Sarkar • No Comments

Detecting command injection flaws (like Shellshock)

In this follow up to our last article about Shellshock, we’ll take a look at an example of a command injection flaw and see how Klocwork detects it. As a refresher, a command injection flaw is the result of improper or incorrect...

Read More »

Static Analysis

Evolving, multiplying threats demand superior application security efforts

November 24, 2014, Chris Bubinas - No Comments

Evolving, multiplying threats demand superior application security efforts

The only way for companies to protect themselves while continuing to take advantage of application development is by embracing new, advanced security...

Software Security

Evolving, multiplying threats demand superior application security efforts

November 24, 2014, Chris Bubinas - No Comments

Evolving, multiplying threats demand superior application security efforts

The only way for companies to protect themselves while continuing to take advantage of application development is by embracing new, advanced security...

High Performance Computing

HPC increasingly important for universities

November 28, 2014, Chris Bubinas - No Comments

HPC increasingly important for universities

HPC technology is proving to be increasingly and vitally important to universities around the world, as a number of recent developments demonstrated...

Open Source

ThreadSpotter source code released to the community

November 14, 2014, Amanda Evans - No Comments

ThreadSpotter source code released to the community

The open source community is a valuable asset to software development. A place where people can share, learn, explore, and grow – an environment...

Embedded Software

Webinar recap: Static analysis’ role in automotive functional safety

July 24, 2014, Roy Sarkar - No Comments

Webinar recap: Static analysis’ role in automotive functional safety

Last week, we held a joint webinar with QNX Software Systems discussing how static analysis plays a key role in automotive functional safety and ISO...

Analytics & Data Mining

IMSL vs. open source: free doesn’t always mean better

November 26, 2014, Roy Sarkar - No Comments

IMSL vs. open source: free doesn’t always mean better

One of our sales engineers explains how proper input verification and error handling for commercial mathematical algorithms can lead to better...

Scroll to top