Cathie’s Corner beta chat

by Cathie Adeney • No Comments

Cathie’s Corner beta chat

Our KlocTalk Beta Progam is underway - learn how to get involved...

Read More »

Car cybersecurity vulnerabilities lead to class action lawsuit

by Chris Bubinas • No Comments

Car cybersecurity vulnerabilities lead to class action lawsuit

A new class action lawsuit claims that carmakers hid known cybersecurity defects...

Read More »

NYT tech blogger witnesses own car hacking

by Roy Sarkar • No Comments

NYT tech blogger witnesses own car hacking

New York Times columnist Nick Bilton reported via Twitter that he witnessed two kids break into his own car without ever laying a finger on the vehicle...

Read More »

“We’re all using the same material” – lessons from the Automotive Cyber Security Summit

by Jeff Hildreth • No Comments

“We’re all using the same material” – lessons from the Automotive Cyber Security...

Jeff Hildreth attended the Automotive Cybersecurity Summit in Detroit last week and realized that we're all banging the same drum for no reason. Here's what happened...

Read More »

When a good algorithm fails, do you trust it?

by Wendy Hou • No Comments

When a good algorithm fails, do you trust it?

Algorithm aversion affects us all. Learn why this phenomenon occurs and how overcoming it can lead to faster and better decision-making...

Read More »

Two sides of the same coin: open source security

by Rod Cope • No Comments

Two sides of the same coin: open source security

More organizations are opening up their code to developer communities but they also need to consider how they pursue open source solutions internally to maximize value and security...

Read More »

Static Analysis

Cathie’s Corner beta chat

May 29, 2015, Cathie Adeney - No Comments

Cathie’s Corner beta chat

Our KlocTalk Beta Progam is underway - learn how to get involved...

Software Security

Driverless cars pose serious cybersecurity risk

April 27, 2015, Chris Bubinas - No Comments

Driverless cars pose serious cybersecurity risk

As auto manufacturers move closer and closer toward full-scale driverless vehicle production, the need for cybersecurity measures will become...

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

High Performance Computing

HPC systems poised for greater growth in near future

May 25, 2015, Chris Gottbrath - No Comments

HPC systems poised for greater growth in near future

As HPC technologies becomes even more widely accessible and useful, firms will find new ways to utilize these resources. ...

Open Source

Two sides of the same coin: open source security

February 23, 2015, Rod Cope - No Comments

Two sides of the same coin: open source security

More organizations are opening up their code to developer communities but they also need to consider how they pursue open source solutions internally...

Embedded Software

Embedded World recap – the scope of things

March 17, 2015, Roy Sarkar - No Comments

Embedded World recap – the scope of things

This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and...

Analytics & Data Mining

Data mining’s impact continues to expand

April 24, 2015, Wendy Hou - No Comments

Data mining’s impact continues to expand

Here are just a few examples of the broadly diverse ways that data mining and analytics are being applied...

Scroll to top